SecurityLink India Magazine April 2018

Page 1






MORE THAN WHAT YOU SEE

TURBO HD 5.0 SOLUTION Boasting new features and functionalities, Turbo HD 5.0 once again takes analogue and CCTV systems into the future. This new version transmits vivid color imaging 24 hours a day, with a brightness and clarity not seen before in TVI systems.

TurboMind

• Deep-learning algorithm • GPU architecture • Human/vehicle extraction

TurboColor

• Larger iris • Better sensor • Friendly lighting




How safe is your city

Infinova is one of the most recognized and preferred Surveillance Solution Providers for City Surveillance

Visit us at Secutech India 2018 Date: April 5-7 Booth: # B-1, Hall 1 Venue: Bombay Exhibition Centre, Goregaon-E, Mumbai World Headquarters: 51 Stouts Lane, Monmouth Junction, NJ 08852, United States Phone: +1 732-355-9100, Fax: +1 732-355-9101 Infinova India Pvt Ltd. Office No.A1&A2, 2nd Floor, S.no.14/1/1, Venus Garden, Thite Wasti, Mundawa By Pass Road, Kharadi, Pune - 411014. Maharashtra, India. Landline and Fax: +91-20-6900-0630, Email: Teamindia@infinova.com


From the Editor’s Desk

(102 pages including 6 for cover) Volume II • Issue 9 • April 2018

Editor-in-Chief Santosh Pathak Principal Consultant Pritam Singh Mehta Dear Readers, Heartiest Greetings from SecurityLink India! ‘Gulshan Rai, India’s Cyber Security Chief avoids netbanking because he understands the issues there’ – the news publicized in media in the mid of March is conspicuous and worth noticing. “I have a separate account that keeps small amounts in the bank. If I have to do that in a debit card, I put Rs. 25,000 in that account and do transaction so that I don’t go to the National Consumer Disputes Redressal Commission,” he made a point. His statement may attract criticism for many reasons, but his candid proclamation has an instruction for the people in practice of online transactions to be aware of the risks and be extra cautious while online. Home Minister Rajnath Singh has recently also impressed upon the severity of the menace of cyber crime and risks involved therewith. “Cyber-dependency has become widespread today. This has increased vulnerability to attack against both civilian and military infrastructure. Cyber crime has become an industry and many cyber crimes related tools and techniques are being offered as services. Even novice criminals with limited investments can afford to have such services at his disposal. I am afraid, cyber attack would occur very often. We have already witnessed an increase in the number and severity of such attacks,” he said in a conference of the International Association of Chiefs of Police. The government, on the other hand, is in consistent endeavour to rein in perpetrators and bring vulnerability to the minimum. Union minister for Electronics and IT, Ravi Shankar Prasad asked the National Informatics Center to take the lead in making India a low cost cyber security hub. Speaking at the second national meet on grassroot informatics he said that the NIC should not only innovate new products for betterment of their own states/ districts but also handhold the local citizens in becoming familiar with new technology. He said this would supplement government efforts in making citizens literate in technology and expedites process of making digital economy reach one trillion dollar mark in five years’ time. He added that NIC should be more pro-active and should support other countries in their endeavor to move towards digital based economy. NIC officers should get more exposure in the emerging technologies including Artificial Intelligence, Blockchain Technology, IoT, Data Analytics etc., that can be further innovated by NIC. NIC has recently introduced two new portals – ‘Centre of Excellence for Application Security’ (CoEAS), and ‘Secure, Scalable & Sugamya Website as a Service’(S3WaaS). This issue of SecurityLink India carries an informative article on ‘Safe Cities: Collaborative Monitoring,’ contributed by PWC and ASSOCHAM which enunciates the significance of collaborative monitoring for a safe city with the proactive involvement of the community. The other editorials of interest are ‘Convergence of Physical and Logical Access’, ‘Turning the Car into a Lifesaver’ etc. Till we meet next month, stay safe and happy reading! With warm regards,

10

Santosh Pathak Mob: +91 9968172237

SecurityLink India Registered Office H-187/5, First Floor Jeevan Nagar Market, Kilokari (Near Maharani Bagh) New Delhi - 110014 Phone: +91 11 26342237 Telefax: +91 11 42828080 E-mail: editor@securitylinkindia.com Website: www.securitylinkindia.com Admin Vibha Dixit Circulation Sanju Singh Design S. S. Rawat Portal Design & Maintenance Monu Kumar Singh Printed, published and owned by Santosh Pathak and published at H-187/5, First Floor, Jeevan Nagar Market, Kilokari, (Near Maharani Bagh), New Delhi-110014. The editor’s name is Santosh Pathak. Printed at Infinity Advertising Services P. Ltd. Plot No. 171-172, Sector-52 Faridabad (Haryana). All Rights reserved. No part of this publication may be reproduced in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise without the prior written consent of the publisher. (The views expressed in this magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)


IP VDP

SAFEGUARD YOUR HOME Introducing Hikvision Analog Video Door Phone Solutions to help keep your Family Safe and Secure

7" Multi-Colour Display I 2 Years Warranty Key Features Door Station

Self adaptive IR supplement

One touch calling

Pinhole camera with 720 x 576 @ 25 fps

Indoor Station

Unlock controlling

Hands-free video intercom communication

Supports monitoring the door station & ext. analog camera

Remote unlocking

Convenient installation & easy operation


National Roundup

april 2018

CONTENTS White paperS Safe Cities: Collaborative Monitoring

18

The Convergence of Physical & Logical Access

38

FEATURE ARTICLES Advanced Threat Landscape Report 2018

55

Safeguards for Securing Virtualized Servers

56

Global Access Management Market to Double by 2021

58

7 Reasons for Multi-Tier Storage Solution for Surveillance

60

Bosch is Turning the Car into a Lifesaver

76

NATIONAL ROUNDUP 26 Role of Women in Fire Safety Industry 27 Hikvision’s Recent Participations 28 Videonetics Bags FIST Award 29 CP PLUS Monitors Lingaraja Temple • Skybox New Appointments 30 • Matrix at Secutech, Mumbai 31 Zicom Makes Telangana Safe 32 Honeywell Command & Control Suite Release 200 12

33 Matrix Insight 34

• CP Plus’ First Manufacturing Facility in India • COM-SUR Protects Bosch, Chennai

35 Matrix COSEC Facial Recognition 36

• Synology DiskStation Manager 6.2 Beta • Videonetics at Secutech, Mumbai

SecurityLink India ■ April 2018


National Roundup

SecurityLink India â– April 2018

13


National Roundup

april 2018

CONTENTS Application/ case studies 44 GJD Protects AAA Coaches from Intrusion

50 SightLogix Protects Telecom Italia Mobile’s Data Center

45 Mobotix Heightened Security for Retail

51

46 Vivotek Secures Jang Su Jang Restaurant, US

52 OnSSI Secures LMI Systems

47 Matrix Access Control Data Centre Solution

53 3xLogic Helps Dayton Church Catch Bad Guys

49 ADT Saves Texans from House Fire

54 Hikvision & Eagle Eye Launch SB-507 Solution for Texas Schools

Product showcase

International updates 14

• Korea Telecom Selects Gemalto • Senstar Protects Major US Airport

78-97

62-75

SecurityLink India ■ April 2018


National Roundup

SecurityLink India â– April 2018

15




white paper

Safe Cities: Collaborative Monitoring For the Community, By the Community C

ities across the world are constantly changing and evolving faster than at any point in their history. They have become more congested, and criminal activities have soared leading to the destruction of public assets. Compounding the problems, terrorism has become a major concern that presents communities and neighbourhoods with new security problems. Faced with a wealth of challenges, which are often elusive, cities are expected to manage and control the change to allow their communities to have a standard of living that meets modern day expectations. The terror attacks around the world reveal that most attacks are highly precise and well-coordinated, and targeted at high footfall areas to create a psychological impact along with monetary losses. Most of the citizens today are well aware of the risks and are in a state of constant anxiety about their safety and security. Hence, public safety has emerged as an important function for governments across the world. Accordingly, the federal and state government depart18

ments responsible for internal affairs and homeland security continuously assess and monitor the internal security situation, issue appropriate advisories, share intelligence inputs, extend manpower support, and offer guidance and expertise to the state governments for the maintenance of security. This also helps in establishing infrastructure for safe cities by capitalising on features from the following distinct categories of surveillance systems: ●● Citywide police surveillance using Internet protocol (IP) based cameras, and ●● Citywide community surveillance including private and institutional surveillance for collaborative monitoring. While the first system is becoming a standard solution for implementation to achieve the safe city vision, the latter is also gaining momentum to involve citizens and private and public institutions in collaborative monitoring. The following sections elaborate on the concept of collaborative monitoring.

SecurityLink India ■ April 2018


white paper

 Today, cities face a wide range of threats, ranging from terrorism and civil unrest to kidnapping and murder. To reduce the impact of these threats, it is critical for the authorities to capture real-time information on what is happening in and around the city. Therefore, there is a growing requirement for utilising the new and emerging technologies to make our cities safer. Given this background, one of the most user-friendly technologies that can play a crucial role is the extensive use of closed-circuit television (CCTV) cameras, which play a vital part in ensuring day-to-day surveillance, crime prevention and monitoring of illegal or suspicious activities. In addition to close supervision, CCTV cameras allow post-incident analysis and collection of indisputable legal evidence. While the government and legal authorities are also encouraging both public entities/ groups and individuals to adopt such progressive technologies, mapping each and every nook and corner of a city without seeking the help of its people is impossible. This formed the basis of a unique community policing initiative called ‘collaborative monitoring.’ As the very phrase suggests, collaborative monitoring is a unique tool, wherein the security and law enforcement agency takes advantage of the extensive network of surveillance cameras deployed by communities across the city as well as the cameras of other private and government establishments on a need basis. It is an extremely prudent enabler for the police department, as while they strengthen their bond with the communities, they can use any information or footage gathered from these security cameras to support investigation and the prosecution of criminals. The advantage provided by leveraging the extensive network of external cameras ensures enhanced crime monitoring through a cost-effective, widespread and scalable model  – Neel Ratan India Government Leader and Regional Managing Partner, North PwC India

What is collaborative monitoring?

A

key enabler for a safe city is the aspect of collaborative monitoring. In cities, where every government and private establishment has realised the necessity to secure its infrastructure and establish surveillance, monitoring and incident response systems, it is important that the data gathered by these agencies is shared among them. In such cities, CCTV-based surveillance systems are being deployed by federal as well as state government agencies at places like bus stands, metros, railway stations, airports, and other critical infrastructure spots and public places. These collaborative monitoring systems can conveniently share their data in real time with security agencies of the city. Similarly, live feeds from CCTV systems deployed by private establishments such as malls, hospitals, business parks and entertainment houses can be provided to the security and law enforcement agencies, which can make effective use of the information. Leveraging the extensive network of external cameras

ensures additional eyes are monitoring crime. In addition, the higher penetration of cameras helps in lowering costs.

Why collaborative monitoring?

I

n her famous work ‘Participation and Democratic Theory,’ Carole Pateman, the renowned political theorist, advocated a greater role for common people in democratic selfrule and argued that development projects are more effective when beneficiaries have a role in the way projects are chosen, planned, implemented and evaluated. Giving citizens a role in initiatives designed for their benefit is considered to be an ideal way to ensure the sustainability and success of any project. Many cities across the world have surveillance systems deployed by multiple public and private establishments. These cities are using the collaborative framework to receive video feeds from these systems to ensure real-time responses and as an invaluable source of crime detection and evidence for the law enforcement departments.

SecurityLink India ■ April 2018

19


white paper

For an instance, the British Security Industry AuthorPwC’s framework for collaborative ity (BSIA) estimated that there are up to 4.9 million CCTV monitoring he entire ecosystem of cameras available to law encameras in the UK including 7,50,000 in ‘sensitive locations’ forcement agencies becomes significant when in adsuch as schools, hospitals and care homes. This translates to dition to the law enforcement cameras, these agencies also one camera for every 14 people in the UK. have access to cameras that are installed across the city as The collaborative framework shall help to meet the folpart of other initiatives, including the very popular comlowing objectives: munity surveillance cameras. Community surveillance ●● Safety and security. cameras are primarily targeted for implementation at ●● Improved responsiveness. ‘establishments’ which are frequented by a large number ●● Effective policing. of people. Such establishments may include places like ●● Improved management. commercial establishments, industrial establishments, reEnsuring safety and security in fragile settings remains ligious of places, educationalagencies, institutions, hospitals, sports the key objective of law enforcement agencies, in addition Ensuring safety and security in fragile settings remains the key objective law enforcement in addition to crisis complexes, railway stations, bus stations, places of organto crisis management duringincidents. serious incidents. The stratemanagement during serious The strategic objectives include the following: ised congregation, and other such establishments as the gic objectives include the following in the below table:

T

• Live surveillance and alerts in case of an incident through a network of cameras • Greater coverage of surveillance within the city, with more eyes on the street Security and safety • Supporting operations at major events, such as crowd control and safety • Preventing crime by detecting and deterring criminal activity, and by helping identify offenders and assisting in the apprehension of offenders, leading to the their prosecution • Providing citizens with access to the police for quick and effective response, along with improved visibility and transparency Improved responsiveness

• Improved response times and a general reduction in the fear of crime in an area • Providing assistance to emergency services and fast turnaround time • Addressing threats of terrorist attacks • Assisting in the management and policing of large-scale events (political, religious, etc.)

Effective policing • Aiding investigations by the police department by integrating analytics tools • Providing evidence for criminal and civil action in courts • Helping in maintaining law and order situations • Helping to improve traffic discipline Improved management

• Acting as a tool for municipal corporations and other government agencies in the monitoring and maintenance of their functions • Providing a framework to all the stakeholders so that there is proportionality and transparency in their use of surveillance • Ensuring scalability and interoperability of systems

20

SecurityLink India ■ April 2018


white paper

government may by notification declare to be an establishment for the purpose of collaborative monitoring. To further explain this ecosystem, city surveillance at public places across the city can be divided into four categories:

Surveillance system in direct control of the city police:

C

ameras directly under the control of the police department and owned by the state government, as set up under the city surveillance/ safe city project and monitored at central/ distributed command centres.

Community CCTV:

C

ameras installed and owned by the community in clusters, which can be integrated into the existing surveillance system. The feed of the community cameras can be viewed at the command control centre on a need basis.

Surveillance system set up by other public institutions:

C

ameras owned by and under the control of various public institutions like railways and airports.

Surveillance system set up by private institutions:

C

ameras owned and controlled by private establishments such as large residential societies, hotels, malls, multiplexes, theatres, hospitals and schools. Certain surveillance systems are already being deployed by many public and private establishments. With a stimulus from the local government, the installation of community CCTV surveillance systems has started, and a cluster-wise process has been deployed at a few places. Therefore, it becomes imperative for law enforcement agencies to have a system which will have a collaborative framework for receiving video feeds on a need basis from these systems and subsystems. Leveraging the capabilities of a good video management system (VMS), when clubbed with video analytics, will also allow efficient access to these external camera feeds at the command and control centre. Collaborative monitoring of video feeds not only facilitates greater coverage of video surveillance within the city but also serves as deterrence for crimes and assists law enforcement agencies in controlling incident escalation, crime detection and its investigation.

Guiding principles

T

he following guiding principles should always be considered while planning, designing, implementing or maintaining the collaborative CCTV surveillance system: ●● The use of a surveillance camera system must always be for a specified purpose which is in pursuit of a legitimate aim and necessary to meet an identified pressing need. ●● The use of a surveillance camera system must take into account its effect on individuals and their privacy, with regular reviews to ensure its use remains justified. ●● There must be as much transparency as possible in the use of a surveillance camera system, including a published contact point for access to information and complaints. ●● There must be clear responsibility and accountability for all surveillance camera system activities, including images and information collected, held and used. ●● Clear rules, policies and procedures must be in place before a surveillance camera system is used, and these must be communicated to all who need to comply with them. ●● No more images and information should be stored than strictly required for the stated purpose of a surveillance camera system, and such images and information should be deleted once their purposes have been discharged. ●● Access to retained images and information should be restricted and there must be clearly defined rules on who can gain access and for what purpose such access is granted. The disclosure of images and information should only take place when it is necessary for such a purpose or for law enforcement purposes. ●● Surveillance camera system operators should consider any approved operational, technical and competency standards relevant to a system, and its purpose and work to meet and maintain those standards. ●● Surveillance camera system images and information should be subject to appropriate security measures to safeguard them against unauthorised access and use. ●● There should be effective review and audit mechanisms to ensure that legal requirements, policies and standards are complied with in practice, and regular reports should be published. ●● When the use of a surveillance camera system is in pursuit of a legitimate aim, and there is a pressing need for its use, it should then be used in the most effective way to support public safety and law enforcement with the aim

SecurityLink India ■ April 2018

21


white paper

basis for monitoring and incident management by the law enforcement agencies. ●● Standard operating procedures and a code of practice should be developed and implemented to set the standards and guide the operation of the scheme. ●● Government/ law enforcement agencies may consider contracting a consultant with appropriate CCTV expertise to assist in conducting a study of the ‘as is state,’ developing draft specifications, functional requirements and standard operating procedures. ●● The approved private sector agencies involved in the provision of CCTV services for collaborative monitoring solutions would, of course, be expected to comply with all codes of conduct, protocols and standard operating procedures developed and applied by the local government. ●●

●●

●●

●●

●●

●●

●●

of processing images and information of evidential value. Any information used to support a surveillance camera system which compares against a reference database for matching purposes should be accurate and kept up to date. Clear roles and responsibilities, including liabilities of each stakeholder with timelines, should be defined, as applicable. A crime assessment should be conducted to identify more accurately what crime problems are occurring, and where and when. Establishments should carefully place CCTV cameras to cover all the areas of vulnerability. It is important that sensitive and critical areas are covered with proper lighting, viewing angles and visibility so that the CCTV feeds give a clear picture of the activity and identify individuals. Establishments should install CCTV cameras and related components meeting open and consistent standards (and avoid any system with proprietary standards). It is recommended that CCTV cameras and related systems comply with the Open Network Video Interface Forum (ONVIF) or Physical Security Interoperability Alliance (PSIA) standards. A periodic review and assessment (at least once in three months, preferably by third-party firms) of the CCTV system should be conducted and documented for management verification. Community CCTV systems should be integrated with the control room at the local police station as well as command centre for access to camera feeds on an on-demand

22

Approach

D

ue to the vast deployment of various CCTV surveillance systems across the city, it is imperative to adopt a standard process for such a roll-out by communities and sustain these systems for a longer period. As a first step, local governments can come up with public safety acts or guidelines with standardised processes and specifications defined to ensure that consistent, sustainable, scalable, quality-based and interoperable systems are deployed. As part of the collaborative monitoring initiative, on behalf of the community, city police departments can also initiate a process of empanelment of CCTV system integrators (SIs) for the supply, installation, operations and maintenance of systems by public institutions or by community associations. The cost for setting up a CCTV based surveillance system within a community area can be borne by the respective community group, while the local government may also support them in arranging for funds through federal and state funding, if available. The option of getting financial assistance from large corporates, institutions, public sector firms etc., can also be explored to reduce the financial burden on communities who are unable to arrange for the required funding. Once this community surveillance system is implemented, it should be connected with law enforcement agencies for collaborative monitoring. The cost for connecting the community with the viewing centres of law enforcement agencies and maintenance cost of this connectivity can be borne by the local governments. Sharing of resources within communities may further reduce the total cost of ownership for these communities.

SecurityLink India ■ April 2018


also initiate a process of empanelment of CCTV system integrators (SIs) for the supply, installation, operations and maintenance of systems by public institutions or by community associations. The cost for setting up a CCTVbased surveillance system within a community area can be

community with the viewing centres of law enforcement agencies and maintenance cost of this connectivity can be borne by the local governments. Sharing of resources white within communities may further reduce the total cost of ownership for these communities.

paper

Process overview

Process overview Readiness of Community • Release of guidelines or enforcement of acts by local governments for standardization of processes and specifications • Identification of Community Group • Interactions with identified Community Group to educate through Awareness Programs and Demo Site Visit • Readiness of Community group for CCTV System • Community Group formation and Documentation

Requirement Gathering and Contract Finalisation • Identification of CCTV System requirements specific to the identified Community Group • Site Survey along with Stakeholders to identify the locations of CCTV system equipment’s • Empanelment of CCTV System Integrators (SI) for the supply, installation, operations and maintenance of systems

Supply and Quality Check of Equipment’s • Material Supply by SI at Community Site

• Location wise Camera installation

• Receipt of Material and Quality Check to verify conformance to Specs and PO

• Cabling and Networking of the System with the local community viewing center

• Evaluation of proposed system design including networking • Site readiness for I&C

• Documenting the System Design and setup details (As built) • Testing of the System in complete working condition by SI • System Corrections by SI for any non-conformance and gaps

• Finalization of Bill of Quantities (BoQ) and cost estimates

UAT and Integration with Law Enforcement Agencies

Installation and Commissioning (I&C)

• User Acceptance Test (UAT) and acceptance of the System & Handover the system to community • Connectivity with the Law Enforcement Agencies • Collaborative Monitoring for the benefit of Citizens / Communities • Operations and Maintenance of system by community associations through SI for the period of contract

• Invite quotations from qualified SI • Finalization & Release of Purchase Order (PO) to SI

Suggestive architecture and integration scenarios

Suggestive architecture and integration scenarios #

CCTV Technology Implemented

Approach

Requirements

Outcome

1

Analogue cameras with digital video recorder (DVR)

Application programming interface (API)/ software development kit (SDK) integration

2

Analogue cameras with DVR

Encoder

Each camera, irrespective of the make, would be needed to connect to an encoder and then to the network.

All cameras would be part of the camera tree at the VMS and would enable complete integration of the cameras into the system. This will also allow for recording of each video feed.

3

IP cameras with network video recorder (NVR)/VMS

API/SDK at camera level

All IP cameras would need to be Open Network Video Interface Forum (ONVIF) compliant or else should share the API/SDK for integration.

All cameras would be part of the camera tree at the VMS and would enable complete integration of the cameras into the system. This will also allow for recording of each video feed.

4

IP cameras with network video recorder (NVR)/VMS

API/SDK at NVR/VMS level

The VMS of existing cameras should be ONVIF and share API/SDK

All Cameras would be part of the Camera Tree at VMS and would enable complete integration of the cameras into the system & also recording of each video feed can take place.

The DVR manufacturer All cameras would be part of needs to share the API/SDK the camera tree at the video Safe cities: Collaborative monitoring | For the community by the community with the vendor of the command management system (VMS) and11 control software. would enable complete integration of the cameras into the system. This will also allow for recording of each video feed.

Further to the above, some of the design considerations be followed SecurityLinktoIndia ■ Aprilwhile 2018 planning the integration of community 23 surveillance systems are as follows:


white paper

F

urther to the above, some of the design considerations to be followed while planning the integration of community surveillance systems are as follows: ●● Only a third-party VMS, which has a pure play Web interface, must be deployed (i.e., no need to configure specific ports or install intelligent ActiveX/ Java). This will ensure no compromise of the IT security of the control centre. ●● A third-party VMS capable of providing replay using a screen-recording solution will ensure the displayed video is available later for replay/ playback. ●● Third-party VMS configuration will be accessible only from the native third-party VMS module.

Challenges

●● Multiple stakeholders: With more stakeholders using and accessing the same systems, there is a greater risk to an individual’s privacy. ●● Waste of resources: If not planned correctly, systems are used in the same areas and are independent of each other, covering the same space, using different networks or fibres and for the same purpose, which is a clear waste of resources. ●● Risk to freedom of expression and association: A sufficiently powerful public camera could endanger rights to freedom of expression by giving the government an extensive record of what individuals do, and whom they associate with. ●● Government accountability and procedural safeguards: Pervasive public video surveillance systems could allow officials to evade both procedural safeguards and accountability. Moreover, with numerous organisations working together to offer a completely integrated CCTV model, it is quite possible that lines of responsibility will be blurred. ●● Equal protection and anti-discrimination: Discrimination retards the very ability of any insular minority group – be it religious, racial, cultural, political or ethnic – to participate fully in civil society. Discriminatory use of surveillance can also give ammunition to those with salacious or malicious agendas. ●● Existing laws and regulatory proposals: Conflict with existing laws and regulations is to be avoided and protection of all rights of the citizens as per the constitution is to be ensured. ●● Standardisation and interoperability: Since each 24

community will be responsible for its own solution being implemented, non-standard equipment/ applications and lack of interoperability may defeat the whole purpose of putting the system in place. If necessary, new acts such as public safety (measures) can be enforced to ensure a consistent, standardised and sustainable framework. ●● Lack of awareness within communities: Many a times, such initiatives do not move forward for next steps due to a lack of awareness or motivation within communities. This can be avoided if proper awareness campaigns and visits to model sites are arranged across the communities. ●● Funding issues: Sometimes, a lack of sufficient funding or sustainable operations and a maintenance framework creates a bottleneck in moving forward. The government may come up with various subsidies or may even have a rate contract with approved SIs to provide services at an already negotiated rate, with a cap on maximum charges. Funding from urban local bodies (ULBs) can also be utilised. ●● Crime displacement: In few of the cases, efforts to implement community surveillance to reduce opportunities for crime do not truly lower crime but merely change where, when or how it is committed. Thus, the introduction of cameras in one area or neighbourhood could result in increased crime elsewhere. ●● Privacy and anonymity issues: Unless procedural limits are implemented, law enforcement officers might use video surveillance to improperly monitor private activity or otherwise go beyond the bounds of their authority. Without accountability safeguards, moreover, the officers might never have to explain their actions. The following are a few of the key concerns which may arise in the minds of citizens: ²² Which organisation is collecting images and for what purposes? ²² Where are the images stored? ²² Who has access to this information? ²² Are they being transferred to third parties? ²² What are the safeguards in place to protect these images? ²² How long will they be stored before deletion? Hence, collaborative monitoring could be a way forward, but it is not without risks. However, with careful consideration, these risks can be managed. The process itself should ensure checks on such risks to garner the maximum fruits out of such initiatives.

SecurityLink India ■ April 2018


With an unmatched nationwide presence, SIS Group’s Facility Management Companies are geared to make Bharat swachh. Our portfolio of brands provide hard FM, soft FM and pest control services to a diverse set of customers across India. Whether you are looking for an outcome based service model or mechanisation-led facility management, Dusters, ServiceMaster Clean and TerminixSIS are there for you.

Soft Facility Management

Hard Facility Management

Janitorial, Housekeeping, Façade Cleaning, Carpet Cleaning and Kitchen Stewarding.

Servicing HVAC, Plumbing, Electrical, Carpentry, Fire and Safety and Building Automation.

Pest Control General Pest Management, Termite Control, Mosquito Control, Rodent Control and Fumigation.

www.sisindia.com A 5000 crore Indian multinational company


National Roundup

Role of Women in the Fire Safety Industry By Rohit Harjani – Country Manager, Indian Sub-continent, Hochiki

T

chandran as a Divisional Fire Officer, making her one of the first female fire officers in the country, and the first one to win Anna Medal for Bravery in Tamil Nadu. In 2013, the department inducted its second batch of women firefighters. In 2012, the Mumbai Fire Brigade inducted five women firefighters, making them the first in the history of the organisation. One of the biggest reasons for the low participation is the absence of a female role model. Over the last several decades, it has become an accepted understanding that improving the status of women is one of the most critical levers of international development. When women are educated and can be employed, a volley of good results follow. According to a recent study by McKinsey, if women played an identical role in labour markets to that of men, as much as US$28 trillion could be added to the global annual GDP by 2025. We require more and more women in the industry as they have the right ability to prove their mettle in various fields including defense services. One such example can be the appointment of Shrimati Nirmala Sitharaman as the Defence Minister of India. Recently Avani Chaturvedi, has also been appointed as the first Indian woman fighter pilot to fly

26

SecurityLink India â– April 2018

he economic development of the nation is dependent on the participation of all sections of the society, more particularly women, who constitute fifty per cent of the population. There are massive employment potentialities that can be utilized by women folk. India is the world’s fastest growing economy, but has one of the lowest rates of female employment. This is the most true especially in the firefighting industry which has seen a major dearth of women in professional roles. Women are both the victims as well as strong enablers when it comes to the fire safety industry. In India, 17,700 Indians died due to fire incidents in 2015. About 48 people die of fire accidents every day out of which 62% are women. While the numbers continue to rise, the awareness on fire safety has hardly gained much recognition. Strikingly, in this whole conversation on fire safety, the female voice is missing. Unlike in the West, where a job in the fire safety industry is revered and a matter of great pride, India still has a long way to go. The instances of women working in the firefighting industry in India are far and few. In 2003, the Tamil Nadu Fire and Rescue Services appointed Priya Ravi-

solo. The fighter stream was opened for women in 2015 and Avani Chaturvedi, along with two other women, Mohana Singh and Bhawana Kanth were inducted into the Indian Air Force fighter squadron in 2016 where they have undergone strenuous training programme to fly fighter jets. Fire safety should also be considered as an industry to support and encourage women diversity and empowerment. The policy of fire and safety industry to recruit only male officers might be reinforcing gender stereotypes and should keep pace with international trends. While even in the West, the number of women staff is very low, but in India its much below the international statistics. One has to remember that the practice of hiring only men could be construed as demeaning to the female gender. We, in the industry, know their real purpose is to provide the safety of everyone in case of emergencies. While women have made significant gains in the past decade in terms of their noteworthy roles in different spheres of life including education, health, technology, economic participation, and political leadership, we as a nation still have a long way to go when it comes to attaining gender equality.


National Roundup

Recent Participations Retail Leadership Summit 2018

Showcasing Retail Security Solutions ikvision has participated in the 11th edition of Retailers Association of India’s (RAI) recently held Retail Leadership Summit (RLS), Mumbai to showcase its latest products and solutions in the video surveillance and security domains for the retail sector. The Retail Leadership Summit (RLS) was flagged off with an inspiring opening speech by B.S. Nagesh, Chairman, RAI and Founder, TRRAIN. The Summit revolved around the central theme ‘Customer Centricity- Redefining Values and Valuations.’ “Retail Leadership Summit (RLS) is a great platform for networking among existing and potential retailers, developers, logistics and supply chain organizations. It is a right place to showcase the latest innovations in the surveillance and security solutions for retail and eCommerce sector,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. At the event, K.K. Dakhara, Retail Vertical Head, Prama Hikvision India gave a presentation on Hikvision’s new solution for warehouse, logistic and supply chain and explained their advantages. “Hikvision retail smart solution focuses mainly on analytics, consumer behavioral analysis and artificial intelli-

H

gence. It is useful in multiple aspects such as retail business surveillance, manpower management, business operations, selection of appropriate product based on target customer, designing marketing plan and loss prevention,” said Mr. Dakhara, “The wide applications of machine learning and DeepinMind technology will set the trend for the retail industry by getting critical data and deep insights from consumer behavioral analysis.” “The Retail Leadership Summit has been created to ensure that retail leaders across the country can come in and discuss matters that are relevant to retail at industry-level. Modern retail in India is becoming more and more competitive and is growing at more than 15 per cent. This kind of growth requires a different focus for retailers to be able to exist and thrive. RLS is about customer centricity and the resulting valuation. However, the values that a company works with are an important contributor to the way a company gets formed and functions. The three aspects i.e., customer centricity, values and valuation are an apt set of topics for every retailer who is trying to grow and flourish in this consumption-led market,” said Kumar Rajagopalan, CEO, Retailers Association of India. Hikvision also displayed their retail solution at a booth there. The visitors were keen to know more about people count, heat map, POS integration, face analysis, parking management solution, and warehouse, logistic and supply chain solutions. The event turned out to be a good platform for Hikvision’s retail solutions for promotions and getting enquiries.

SecurityLink India ■ April 2018

27


National Roundup

ELETS School Leadership Summit 2018

Videonetics Bags FIST Award

Presenting Education Solutions

H

ikvision was part of the recently held ELETS 2018, the 5th School Leadership Summit to showcase its innovative solutions for the education sector in Bengaluru. “Hikvision has been spearheading ‘School Security Program’ to focus on the education security issues, which can be addressed effectively through innovative security solutions. The School Leadership Summit is the perfect platform. Hikvision has a wide range of security solutions which specifically cater the education sector. We also explored newer opportunities like the broadcasting solution. Hikvision presents the vertical specific product basket to the education fraternity to promote the optimal usage of cameras and DVRs for a higher purpose and remote learning,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision, “Hikvision’s smart solution for schools and campuses secures educational facilities with its advanced technology, powerful cameras, and critical recording devices.” Hikvision focused on promoting the broadcasting solution, which has a PTZ camera with a smart tracking option, which tracks the teacher during the lecture and zooms when the teachers writes something on the board. This feed can be streamed live to other classes in the building or even to any part of the world. It even records the whole lecture to be played or seen later by anyone anytime. Other Hikvision solution displayed at the event was face recognition solution. This was a one day conference and over 200 participants graced the event, the notable among them were Neti Srinivasan, COO, Ryan Group; Ms. Vandana Lulla, Director of the Podar Group of International Schools; Amol Arora, VC and MD, Shemrock and Shemford group of Schools, and others. The Hikvision stall at ELETS School Leadership Summit attracted a good number of Industry specific visitors, which included decision makers from the education institutions. The overall response was good as the event generated some relevant enquiries.

28

Industry’s Highly Acclaimed Award for its ‘No Helmet Detection’ Technology

V

ideonetics’ path-breaking technology ‘No Helmet Detection System’ (NHDS) has been recognized with the prestigious FIST ‘Make in India – Best Innovation award of the year’ at Fire & Safety India Expo 2018, organized by FSAI. Highly acclaimed in the industry, FIST Award recognizes extraordinary contribution of organization and individuals in the field of security, safety, firefighting and emergency response. The gala award night was attended by eminent figures from the industry fraternity.

Avinash Trivedi, VP, Business Development, Videonetics (C) with the Award

By overcoming rigorous stages of evaluation with flying colors and competing to cutting-edge products presented by other companies, the judging panel and industry experts highly voted for No Helmet Detection System which is designed and developed on ‘Indian Deep Learning’ Framework. NHDS aims to bring down road accidents and enforce traffic discipline amongst people by penalizing two-wheeler riders who do not wear helmet while driving and eventually put their lives to risk. Commenting on the achievement, Dr. Tinku Acharya, MD & Founder, Videonetics said, “We are thankful to FSAI for acknowledging and honoring our R&D efforts with the FIST award. We are committed to promote culture of innovation in India and to introduce such advanced and smart technologies that can address challenging environment for highly populated countries like India. No Helmet Detection System (NHDS) is the pioneering solution which will certainly inculcate traffic discipline amongst people, build traffic management more robust, increase road safety, eventually to make India smarter and safe.”

SecurityLink India ■ April 2018


National Roundup

Cameras Watch Over the Sacred Lingaraja Temple Helping the heritage temple secure its property and ensure safety of its visitors

T

he Lingaraja temple is one of the oldest Indian temples dedicated to Shiva. It represents the Kalinga architecture, a culmination of the medieval stages of architectural tradition in Bhubaneswar. 55m tall and spread over an expansive 250000 sq. feet area, it is the largest temple in Bhubaneswar. The temple complex has 50 shrines and is enclosed by a large compound wall. Maintained by the Temple Trust Board and the Archeological Survey of India (ASI), the temple sees about 2000 visitors per day, on an average. During festivals such as Shivratri, this number can run into lakhs. Due to the huge visitor footfall, the temple management often faces challenges in tracking and managing crowds effectively, more so during festive times. Lack of adequate security makes the temple and visitors vulnerable to theft, pick-pocketing, unauthorized loitering and unnecessary chaos. While the temple had delegated personnel to keep a watch on the premises, manning the expansive property proved to be time consuming and inefficient. Besides, during festive times, manning the premise and managing the crowd was impossible. The security of the temple property and its visitors and their belongings was a pressing concern for the temple administration and therefor they approached CP PLUS for a solution. CP PLUS solution design experts got to it right away; however, the project was tricky. Heritage structures such as

Image courtesy: Telegraph, India

these are mostly centuries old, tampering with which can prove to be risky. Too much of drilling can cause damages that would entail high repair costs. Further, The Lingaraja Temple was built of laterite, a rock stone, which meant special equipment would be required for installing cameras. The team also had to take into consideration the user interface which needed to be simple so that the temple administration could easily operate and manage it.

Solution

A

fter analyzing the requirements, the CP PLUS solutions team designed a solution comprising of some of the most advanced IP cameras to meet the client’s requirement. A combination of 2MP full HD bullet cameras (20mtrs) and 2MP PTZ cameras (100mtrs) were used to monitor the entry and exit corridors, and the perimeter. While the 2MP HD bullet cameras allowed for monitorSecurityLink India ■April 2018

ing queues and corridors, the long range 2MP PTZ camera was deployed to monitor perimeters. To monitor the inside of the temple a 2MP full HD was installed. Further, 16 channel and 32 channel HD (1080p) DVRs were used to record and store recordings, and an additional 32 channel NVR was installed so that the live videos could be made accessible over the internet from anywhere.

Impact

T

he high definition video surveillance solution delivered great results, meeting client expectations successfully. High definition imagery with face detection helped the temple administration track and manage visitors effectively. Further, consequent to installing cameras, crowd behavior has also been impacted. Enhanced overall safety and operational efficiency allow the management to monitor the vast expanse effectively. 29


National Roundup

New Appointments Gerry Sillars to Lead Asia Pacific Region Rahul Arora as New Regional Sales Director for India and SAARC

S

kybox Security has appointed Gerry Sillars as the Vice President for Asia Pacific. In his role, Sillars will be the cornerstone of the company’s APAC operations, focusing on the continued expansion of Skybox’s footprint in the entire region, as well as evolving the company’s channel business. Skybox experienced 433 percent year-over-year growth in APAC for 2017 – including 350 percent Rahul Arora growth in India. Sillars will increase hiring in APAC to further support the needs of customers and build on the company’s foundation of business. He will also focus on expanding regional distribution through resellers, system integrators and managed security service providers. Sillars has more than 15 years of experience building scalable software businesses in APAC, including such companies as Commvault Systems, Alcatel Lucent and UpGuard. As Commvault’s first employee in APAC, he established their business in the Australia/ New Zealand region prior to building businesses throughout Asia – driving significant double and triple digit growth during his tenure. In his last two years, he served as the Worldwide VP of Commvault’s Cloud Solutions Group where he built the Commvault Global Systems Integrator group in India and developed the regional business from the ground up.

 I’m joining Skybox at an extremely exciting time. The Skybox platform serves a huge market need in this region, as there is a real thirst for solutions that simplify and automate day-to-day cybersecurity workflows and processes, especially as networks are increasing in size and getting more complex. Companies are quickly moving workloads to the cloud – or jumping to a cloud–first solution altogether. This is making the CISO’s job ever more challenging. They’re looking for a platform like Skybox that gives them a single view to their hybrid networks, and a way to easily manage and quickly address risk  – Gerry Sillars Vice President, Asia Pacific, Skybox Skybox Security has also appointed Rahul Arora as the new Regional Sales Director for India and SAARC. Mr. Arora has a background in cloud networking that complements the company’s capabilities in virtual and multi-cloud environments. Prior to joining Skybox, Rahul worked with Citrix as the Director of Cloud Networking for India, running their Netscaler business in the region. Previous to that, he worked for SevOne Inc., as the Regional Director for India and SAARC where he built and ran Akamai’s Enterprise group in India. 30

SecurityLink India ■ April 2018

Showcasing at SECUTECH, Mumbai

M

atrix participates in SECUTECH Mumbai from 5th April to 7th April 2018 to demonstrate their enterprise grade, well-engineered Security solutions. In the event Matrix will showcase futuristic technologies from the security domain. The Matrix access control and time-attendance domain will showcase its newly launched face recognition technology for authentication through mobile. This technology enables contactless authentication with precise and accurate authentication. Talking about smart phones, Matrix will showcase its Mobile based Access Control solution, whereby a user can either scan QR code or just twist his/ her phone for bluetooth authentication. Matrix will also showcase some extraordinary biometric door controllers useful for applications in time-attendance, access control, visitor management, cafeteria management and more. Matrix’s video surveillance wing is going to sport a new range of IP cameras incorporating SONY STARVIS series sensors with EXMOR technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image in varying light conditions (True WDR), better bandwidth optimization and many other features. These cameras, when coupled with intelligent video analytics, provide excellent perimeter security and intrusion alerts through various means like SMS, e-mail etc. They will also exhibit the video management system (VMS) SATATYA SAMAS which can seamlessly automate the parallel working of various systems integrated in an organization. Alongside, we are going to present the recently launched new range of network video recorders that are equipped with characteristics like cascading, camera-wise recording retention, database level integration and plenty of other distinct features.


National Roundup

Making Telangana Safe ZICOM Expands ‘Make Your City Safe’ Initiative to Telangana The company plans to expand this initiative to other states in India

Z

icom, one of the pioneers in the electronic security industry, is expanding its citizen-safety initiative ‘Make Your City Safe’ (MYCS) to the state of Telangana towards making the state safe. The company has recently signed an MoU to launch the citizen safety mission for Telangana in the honorable presence of Home Minister Naini Narshimha Reddy and other influential stalwarts by the name of ‘Make Telangana Safe.’ Zicom launched Mission ‘Make Your City Safe’ in 2012. It is a Zicom SaaS initiative to make housing societies, schools and hospitals more secure by equipping them with high quality CCTVs that require ‘zero investment, zero management.’ Apart from providing hardware, the company also undertakes the responsibly of monitoring the health of their security systems and offering free-of-cost services to ensure the smooth functioning of their products. With currently over 4500 buildings coming under the MYCS banner, Zicom looks forward to a safer and better urban lifestyle to become a reality. Taking this initiative to another level by extending the mission to cities across the country, Zicom SaaS has recently partnered with TITA and Digithon to create a robust digital ecosystem that not only monitors but also prevents crime in Telangana. Currently the initiative encompasses the cities of Hyderabad, Varangal, Karimnagar, Adilabad and Nalgonda. Today Zicom’s initiative has its presence across 7 cities (8th being the

 We, at Zicom SaaS, have been committed towards the cause of citizen safety through our mission ‘Make Your City Safe’ since 2012. MYCS has earned Zicom the responsibility of providing safety and security to over one million satisfied residents across the country. With the spread of cities, and many cities turning into smart cities in the next one decade, Zicom sees a larger role for itself as a major security service provider to them. MYCS is the one step forward towards fulfilling that responsibility. We believe, through this initiative, the authorities have set an example for other states as well on how the power of technology can be used to prevent crimes and ensure the safety of citizens  – Pramoud Rao Founder & Managing Director of Zicom SaaS Pvt. Ltd. cities of Telangana) by the names of Make Mumbai Safe, Make Pune Safe, Make Navi Mumbai Safe, Make Thane Safe, Make Hyderabad Safe and Make Ahmedabad Safe. As the part of the upcoming phase Zicom plans to cover the whole of Telangana followed by other states as well. The company is also exploring for possible associations. Under the ‘Make Your City Safe’ initiative, Zicom will offer a broad spectrum of security solutions on Security-as-a-Service model. Additionally, the company is also exploring the idea of establishing their local command center to support ‘Make Telangana Safe’ initiative and to help citizens connect all buildings for monitoring and proactive prevention of crimes. The key benefits of Make Your City Safe are mentioned below: SecurityLink India ■ April 2018

●● The hardware and software costs are to be borne by Zicom – users have to pay for the services only. ●● No worries about the functioning of the system, Zicom assures that the system will function 24x7, 365 days. ●● No financial burden – Easy payment option that doesn’t need the society to block any funds for buying CCTV system. ●● No annual maintenance contract – It is Zicom who maintains the CCTV system and also takes care of repairs and replacements. ●● No confusion on what is best for customers – Free security assessment by experts that helps one choose the right security solution. ●● Always accessible – 24x7 technical/ after sales support enables customers to stay connected. 31


National Roundup

Command & Control Suite Release 200 Enhanced Building Technology Offers New Interfaces to help Improve Data Visualization and Decision-Making

H

oneywell has introduced its latest smart building technology, Command and Control Suite release 200 (CCS R200), which connects building personnel with data analytics to help drive operational improvements and efficiencies. CCS R200 builds on the original Command and Control Suite by offering more user interfaces to bring building performance data to key personnel, when and where they need it – from building operators and managers to security incident response teams – helping to reduce operational costs, mitigate risk and enhance business continuity. CCS R200 combines intelligent automation, advanced analytics and data visualization with the contemporary user experience of consumer home and mobile electronics, bringing simple, intuitive displays to building operations to

32

From the board room to the boiler room, Honeywell’s Command and Control Suite release 200 connects building personnel with insights to enhance overall security and building operations enhance facility and security management in an easy-to-understand manner. The latest release brings the holistic integration, mapbased visualization and incident workflows of CCS to the control room workstation, desktop PCs and windows tablets, extending the software’s mobile, touch-optimized experience to more interfaces. This creates a seamless hub of information pulled from IT networks, building control systems and outside sources, which allows for better incident response and operational decision-making. “The value of a building’s data is dependent on how easily the right people can access and understand it. As today’s operations become increasingly data-driven, it’s imperative for organizations to ensure they’re taking steps to make this data accessible and actionable to those who need it in order to do their jobs such as security personnel, building operators and C-suite executives,” said John Rajchert, President of SecurityLink India ■ April 2018

Building Solutions, Honeywell Home and Building Technologies, “That’s why we chose to develop more interfaces and software mobility functions with CCS. We’re providing additional ways for key personnel to tap into key building insights so they can keep systems up and running and optimize building operations.” Building off the basic components of the original Command and Control Suite, CCS R200 is designed with the same ease of use as the Command Wall, which was designed as a collaboration and team decision-making tool, and features map-based visualization and navigation from a single intuitive touch screen. CCS R200 brings that same ease of use to core operational interfaces, the Command Station and Command Console, extending an organization’s ability to turn complex data into easy-to-implement changes to enhance overall building operations. The Command Station is a single window, single monitor interface, designed for a desktop PC, laptop and Windows tablet, and is often ideal for facility technicians, security guards and management as well as for casual use by occupants. It allows even inexperienced users to quickly understand the overall situation at a glance by pro-


National Roundup

viding unique insights in a straightforward manner, while allowing expert users the ability to drill down to technical detail and full system control. The Command Console, in contrast, is a premium multi-window, multi-monitor interface designed for engineers, control-room operators, and building mangers, and others who need to view insights from multiple systems and areas of a building simultaneously. It seamlessly integrates with Honeywell’s digital video manager console to access and provide a view of video footage and corresponding data for improved operational decision-making. In addition to new interfaces, CCS R200 includes enhancements to the original system’s incident workflow feature, which guides users through scripted responses to security incidents and other emergencies. The enhancements include map visualization to clearly locate an incident, such as a fire alarm going off, to quickly identify the exact location. Integrated with the underlying control system, workflows can be initiated by system alarms and procedure steps can include operatorinitiated control actions such as announcement, equipment start up, door release and other actions depending on the needs of the incident. Additionally, with CCS R200, organizations can issue multiple Incident Workflows, which can be managed by different people in order to promote efficiency and overall security. CCS R200 integrates with Honeywell’s flagship building management platform, Enterprise Buildings Integrator (EBI), which helps facilitate the integration of security, comfort, life safety and energy systems among other functions. CCS R200 is available now.

Matrix Insight Exhibiting Innovative Telecom and Security Solutions

M

atrix will exhibit its solutions at Matrix Insight, the maiden product expo organized on April 8, 2018 at Hotel Intercontinental Jeddah, Saudi Arabia. The event is conducted in association with their regional partner The Network Guide (TNG). Matrix presents its latest PBX, PRASAR UCS – Pure IP Solution for modern enterprises that supports up to 2,100 IP users from a single box at the event. The product finds its applications in hospitality, multi-location, retail, healthcare and other industry verticals where mobility is the key for productivity. The SIMADO range of GSM gateways is expected to be in the limelight for apparent benefits of wireless connectivity and pocket friendly telephony costs. Matrix will display its hospitality PBX that support calling activities in hotels from 40 to 3,000 rooms. The PBX offers integration with well-known property management software (PMS) without any middleware, helping hotelier manage routine operations and create enhanced guest experience. They will exhibit their scalable Gateways which can be deployed in standalone mode and offer easy switch between PRI, GSM, IP and Analog networks from a single chassis. Matrix SPARSH VP710 – Smart Video IP Phone is also expected to remain in spotlight at the event. Matrix video surveillance wing will sport a new range of IP cameras incorporating SONY STARVIS series sensors with EXMOR technology. This gives the cameras an edge over others in terms of exceptional low light performance, consistent image in varying light conditions (True WDR), better bandwidth optimization and many other features. These cameras, when coupled with intelligent video analytics, provide excellent perimeter security and intrusion alerts through various means like SMS, e-mail etc. They will also exhibit video management system (VMS) SATATYA SAMAS which can seamlessly automate the parallel working of various systems integrated in an organization. Alongside, they are going to present the recently launched new range of network video recorders that are equipped with characteristics like cascading, camerawise recording retention, database level integration and plenty of other distinct features. Matrix will also demonstrate its time-attendance and access control solutions to escalate productivity and security of SME, SOHO and large enterprises. The enterprise grade time-attendance solution contains real-time features such as auto push events to server, instant notification, automatic device identification, scheduler service for report and backup, and more. Furthermore, access control being the prime requirement in terms of security. Their standalone access control solution single panel can handle up to 255 doors and 25,000 users. Witness cutting-edge Matrix biometric solutions will also be displayed. “Our product portfolio is constantly evolving, with new products and new features being added to the existing products. We look forward to strengthening our bond with partners and conduct this product expo successfully by showcasing our innovative products and solutions that can accelerate business growth,” said Ganesh Jivani, Managing Director. SecurityLink India ■ April 2018

33


National Roundup

Launches First Manufacturing Facility in India

Fostering the ‘Make in India’ Initiative of GoI

C

P PLUS is bolstering its production in India by opening its first dedicated manufacturing plant in Andhra Pradesh, India. They are setting up the manufacturing facility under the Honorable Prime Minister’s ‘Make in India’ initiative which lays a lot of emphasis on R&D and local development of goods. Established in Chitoor, near Tirupati, Andhra Pradesh, the state-of-the-art facility is equipped with world class technology for manufacturing a wide range of security and surveillance products to cater to the needs of government, defense, navel and key infrastructure projects which is ideal for Indian environment and various challenges. The facility has also indigenous R&D and Test Lab to ensure stringent quality standards and innovations of the products. With a productions capacity of 2.4 million cameras and 0.6 million recorder per year which is scalable to 6 million cameras and 2 million recorders, the new plant enables CP PLUS to upsurge its production capacity in India and to serve its consumers better and more effectively. Commenting on the launch, Aditya Khemka, Managing Director, CP PLUS India and Aditya Group said, “Security is a huge concern in India presently and CP PLUS intelligent solutions will go a long way in taking preventive steps towards a safe and secure world. This investment demonstrates our ambition to grow in the important Indian surveillance and security market. We are also designing some unique products and solutions indigenized to meet the dynamic needs of our customers.” The state-of-the-art manufacturing facility boasts of a robust R&D lab that is equipped with the latest technology to create and test breakthrough technologies and product. CP PLUS also aims to create hundreds of jobs through this initiative. Over a time, as the production expands, the demand for skilled workforce will also increase. 34

COM-SUR Helps Protect Bosch, Chennai C

OM-SUR has joined hands with Bosch India to help protect their Chennai factory. COM-SUR, the CCTV video footage auditing, smart backup and intelligent reporting software, has been deployed by Bosch India, to complete the workflow of video surveillance. “This is a great honour for us at COM-SUR that Bosch, who themselves are a massive camera manufacturer, has recognised the value and potential of the technology. The ability to audit their video footage regularly with such ease and efficiency was of prime importance to them. With the regular and dedicated use of COM-SUR, they shall have far greater prospects of: 1. Achieving crime, fraud, and loss prevention. 2. Solving crime faster. 3. Improving processes, compliance, safety. 4. Improving employee performance, customer satisfaction and sales. 5. Gaining situational awareness, actionable intelligence. 6. Reducing data size and remote storage. 7. Standardizing multiple activities related to CCTV/ surveillance. It has been a pleasure working with their team, who also share our philosophy,” says Gautam Goradia, CEO & MD, COM-SUR. With COM-SUR, not only will they be able to achieve the above mentioned benefits, but they shall also be able to: ●● Audit hours of video footage from multiple cameras in minutes. ●● Remotely store huge amounts of ‘relevant’ data. ●● Search to tag and retrieve data easily. ●● Quickly create videos from multiple cameras in single MP4 file. ●● Create and share intelligent audit/ incident reports and gain business intelligence based on ‘patterns’ etc.

SecurityLink India ■ April 2018


National Roundup

COSEC Facial Recognition A Powerful Biometric User Identification based on Innovative, Deep Learning Technology

M

atrix has recently unveiled its indigenously designed COSEC Facial Recognition. Matrix COSEC Face Recognition is based on innovative, deep learning technology, which evolves as per regular user interaction in different conditions. It identifies a user quickly and accurately with 1:1 or 1:N identification method. The technology checks liveness of a face with 99.53% accuracy. It accepts the user’s mobile as a credential, which eliminates hardware cost and makes the verification process simple and secure. With contactless authentication, Matrix COSEC Facial Recognition technology reads the user’s face through COSEC APTA application. It ensures contactless authentication and identifies user’s face in <1 second. It eradicates the issues of identifying varying height of user(s) as the user needs to capture the image of their face in a smart phone for authentication process. Moreover,it works well even in low bandwidth conditions and is agnostic to changes in facial hair, angles and lighting. “Matrix Facial Recognition is a powerful tool conceived with liveness detection method. It has the ability to read beyond the surface of the skin and identifies real skin within fraction of a second. With the addition of these unique biometric technology in our range of security solutions, we want to

weave our image as a company manufacturing solutions catering to different verticals for various access control and time-attendance applications,” commented Jatin Desai, Product Manager, Access Control and Time-Attendance, Matrix. ●● Smartphone as an identity: By installing COSEC APTA application in their smartphone, users’ mobile becomes a biometric device for timeattendance and access control applications. Identification or verification is done through capturing an image of their face through the phone’s camera which in turn marks their attendance. ●● Ease of face enrolment: The user face enrolment is done by capturing the image of a user’s face from different angles, which gets stored in COSEC CENTRA/ VYOM database. ●● Unique enrolment: Due to unique technology of TRAIN feature in COSEC APTA, user’s face can get easily SecurityLink India ■ April 2018

●●

●●

●●

●●

recognized in dynamic and uncontrolled environments. With TRAIN feature, user can add many images of their face for error free facial recognition. Face recognition: It works on 1:N authentication method wherein, a user’s face is compared with the facial images in a database of stored records. Face detection: It works on 1:1 authentication method wherein, a user’s face is verified against the logged in ID of the user. Dual security: For strong authentication, user’s face is verified after establishing bluetooth connectivity with the assigned door for accessing the door assigned to respective user. Location tracking through GPS: To keep track of the user’s movement outside/ inside the premises, COSEC APTA sends location details to the server using GPS by taking user’s face image from the present location. 35


National Roundup

DiskStation Manager 6.2 Beta ynology®, the global leading provider of Network Attached Storage (NAS), IP Surveillance and network equipment solutions releases DiskStation Manager (DSM) 6.2 Beta and several packages, inviting the Synology community to experience the latest software and participate in the development process. “Synology continuously observes the market and enterprise users’ needs such as network security, data protection, disaster recovery, high-performance storage and productivity applications,” said Vic Hsu, CEO, Synology Inc., “Synology NAS does not just provide network storage devices, but a powerful wide range of application services for business.”

S

Key new features in DSM 6.2 include

Exciting storage technologies for efficiency enhancement

●● Storage manager: A new storage component, Storage Pool, is introduced to provide a highly consistent and smooth storage management experience; a new dashboardlike overview comes with rich and useful information. With smart data scrubbing, it gives an easier way to prevent bit rot without sweat. ●● iSCSI Manager: a revamped, dedicated management tool for iSCSI service, providing a new LUN type with the refined snapshot technology based on Btrfs file system that enables snapshots to be taken within seconds regardless of LUN size.

Maximize service uptime with reliable failover plans

●● Synology high availability: New mechanisms allow SHA to be set up and run within 10 minutes, providing a refined user experience. With its built-in and improved monitoring tools, IT admins can easily monitor the active and passive server and perform maintenance.

Comprehensive security protection for login and connection

●● Security advisor: Security Advisor uses intelligent techniques to dissect abnormal login and analyze the attacker’s location. DSM will send notifications when having detected any unusual login activities. With a simple click, IT admins can review a daily or monthly report on DSM system security scan. ●● TLS/ SSL profile level: TLS/ SSL Profile Level chooser provides each network services to have its own TLS/ SSL connection profile. It gives users a more flexible way to configure the network security environment.

Optimized communication and seamless collaboration

●● C hat and calendar: Chat welcomes the long-awaited desktop application on Windows, MacOS and Linux, and features including poll, bots, threaded message, and third-party video conference integration. Calendar now allows to attach files to events to centralize all the relevant information, and comes with week numbering and keyboard shortcuts to view the calendars with ease.

at Showcasing Unified Video Center

V

ideonetics participates in the Secutech India, Mumbai to be held during 5-7 April 2018. The company is all set to launch “Unified Video Center,” a state-of-the-art software video platform, powered by patented Indian deep learning framework, and encompasses powerful and enterprise class intelligent video management software, video content analytics, intelligent traffic management system, highway traffic management system, face recognition & detection software and video data visualization & dashboard. The pavilion has the demo zone to provide live and hands-on experience to visitors. Expressing on the participation, Avinash Trivedi, VP - Videonetics said, “Secutech India is a great opportunity to showcase Videonetics unique offerings to end users, consultants, channel partners and other stake holders of the eco-system. We are eagerly looking forward to the show and very sure of its grand success this year too.” 36

SecurityLink India ■ April 2018


28-30 June 2018 Hitex, Hyderabad

Gateway to security markets of South India

• • • • • • • • • • • • • • • •• • • • • • • • •••

From the organizers of IFSEC India. PRODUCTS ON DISPLAY

CCTV

INTRUDER ALARMS

FIRE DETECTION SYSTEMS SURVEILLANCE SYSTEMS

METRICS & RFID

ACCESS CONTROL

CYBER SECURITY

INTEGRATED SYSTEMS

IT & NETWORKED SECURITY

Key features 4000+ Decision Makers and Influencers SI's, VARS, Dealers Architects and Solu�on Providors Representa�ve from the Government and Public Domain Solu�on Seeking End �sers from different ver�cal Knowledge driven conference and workshops 75+ Exhibitors Media Partners

Suppor�ng Associa�ons

CONTACT

Pankaj Sharma E: pankaj.sharma@ubm.com | M: +91 99713 65776

www.safeindiaexpo.com


white paper

The Convergence of Physical & Logical Access What it really means for an organization’s security

Vishwanath Kulkarni Director of Sales, Physical Access Control India and SAARC, HID Global

F

or many security professionals, recent high-profile data breaches have shifted attention to external cyber threats. Despite this newfound focus, the Institute for Critical Infrastructure Technology reports that more than half of all cybersecurity incidents can be traced to insiders with legitimate access to corporate facilities and networks. Another survey from the Ponemon Institute reveals that the majority of respondents are more concerned by outside threats than those that originate internally. While external threats are very real, working to confront internal vulnerabilities can prevent incidents from happening in the first place. By addressing both physical and logical access in a more unified approach, organizations can reduce their risk for a costly breach while also improving user experience and operational efficiency. This idea is frequently referred to by the industry buzzword of ‘convergence.’ From a technical standpoint, convergence is defined as “the merging of distinct technologies, industries, or devices into a unified whole.” In terms of access control, convergence can be viewed as “the merging of physical and logical access control technologies to provide a more unified and simplified approach to identity management.” “Convergence means a simplified approach,” said Sheila Loy, Director of Healthcare Industry, Identity and Access Management at HID Global, “That can mean many different things, but it’s essentially making it easier for the user to get both digital access and door access. That usually comes in the form of a card or a mobile device – something that can do both.” While the notion of convergence is nothing new, this approach to security is becoming an increasingly viable way to mitigate threats. To explore this further, ASIS International recently partnered with HID Global to survey security professionals regarding their experience and related plans on 38

convergence projects. The data in this paper is based on the responses of 745 ASIS International members who have direct responsibilities in physical and/ or information security.

The benefits of convergence: Improved user experience, operational efficiency and security Security administrators are looking for solutions that are easy, convenient and fast. By introducing solutions that better blend physical access control (PACS) with logical access control (LACS), organizations of all types will enjoy three key benefits including: 1) positive user experience, 2) enhanced administrative experience, and 3) improved security.

Positive user experience

O

ftentimes, the weakest link in even the strongest of security systems lies within the end user. If interactions with security technologies are confusing or cumbersome, employees will take shortcuts that introduce unnecessary vulnerabilities. Converged PACS and LACS solutions help reduce this risk by boosting convenience, particularly by requiring employees to only carry one card or mobile device. This type of solution also eliminates the need to constantly refresh passwords. In today’s world, most end-users wear an ID badge to access facilities, which is a form factor they are accustomed to using. Even more, many employees either use a user name and password or a one-time password fob or token to access networks. While this approach may provide an additional layer of security, it is prohibitive in terms of convenience. Alternatively, providing a single form factor for both physical and logical access creates a more streamlined user experience, which ultimately increases user adoption to desired security policies.

SecurityLink India ■ April 2018


white paper

“Building occupants who have entitlements to both physical areas and logical applications will see an enhancement in their experience,” said Brandon Arcement, Director of Product Marketing at HID Global, “Convergence results in greater employee efficiency and a more pleasant work environment for building occupants. It’s easier for employees to carry one card or one mobile device to access both systems, rather than having to carry a card for the door as well as a fob for the computer or having to remember passwords.”

proved administrative experience. First, many applications used to manage credentials are now web-based with secure, simple access for administrators. This allows security teams to issue, modify, or revoke credentials away from the office or during off-hours. The second angle is the ability to deploy a converged ‘high value’ form factor that allows for multiple applications. For example, using one card for multiple uses reduces costs for additional or replacement cards, as well as reduces the time required to produce multiple credentials for individual applications. According to survey data, the value of leveraging smartcards for applications beyond physical access is more than theoretical – 73% of respondents agree that they have interest in using smart cards for applications beyond traditional physical access control. Finally, more converged access control solutions provide security administrators with more visibility into audit data. This makes achieving compliance easier, thus reducing the potential for associated fines and damaged reputations.

Improved security

T

In terms of logical or network access, one major pain point for end users is the need to remember and frequently reset their passwords. When ASIS International members were asked, “How access to network and logical applications is done today,” a resounding 85% of respondents indicated that they use a user name and password. 85% of respondents also indicate that they have an organizational policy regarding the creation of passwords such as requiring numbers or special characters. Not only is this inconvenient for users and administrators, it presents another common security risk – employees writing their passwords on notes left visible on their desk.

he most important benefit of any technology is improved security. Innovative technologies for physical access include contact and contactless cards with encryption that adds additional layers of security upon entering doors, elevators or parking garages. Meanwhile, digital certificates loaded onto that same smart card can ensure trusted login to networks and applications, as well as encrypt e-mails and digitally sign documents. Converged solutions improve security in three key areas: ●● Increased adoption rate of converged credentials: With a simplified experience, users are more likely to adopt desired security protocols. HID Global’s Loy says,

Enhanced administrative experience

C

onverged access control solutions provide an improved administrative experience. When survey respondents were asked to rank a series of benefits of PACS and LACS convergence, the top response was ‘easier to manage employee credentials,’ followed by ‘one card for multiple applications.’ These top responses reflect two key angles within an imSecurityLink India ■ April 2018

39


white paper

strengthening organizational security, upgrading access control to leverage a more converged credential seems like a valuable exercise. However, when it comes to actually implementing convergence-based projects, multiple barriers can disrupt progress.

Challenges to achieving PACS and LACS convergence

D “Your employees may have had a badge to access doors for quite sometime. But when they don’t have to carry extra form factors like a fob or token, or they don’t have to take extra steps by entering a user name and password, it provides a streamlined end user experience that increases adoption rate.” ●● Credential more closely guarded: A converged credential is used more frequently and is relied on for more daily activities, thus is more quickly noticed when lost or missing. “Whenever someone uses a credential for applications beyond basic physical access control, it increases value to that card and adds more reason to keep it handy – now that card becomes more closely guarded,” Arcement notes. ●● Reduced need for strong passwords: Security is also improved because cards can eliminate the need for passwords, which are often the weak link in logical accesscontrol. Beyond reducing this vulnerability, leveraging a converged card requires users to remove their card to move around in a secure facility, automatically locking a computer upon card removal. From improving user and administrative experience to

40

espite an increasingly relevant business case and a growth in available technologies, the implementation of convergence projects can be described as surprisingly slow. This lack of adoption can be attributed to two primary obstacles – organizational and technical challenges. Organizational challenges include common conflicts between physical security and IT departments, like budgets and priorities, whereas technical challenges encompass the implementation itself such as upgrade paths and compatibility.

Organizational challenges

O

rganizational and internal communication challenges serve as a key barrier to implementing convergence projects, most often due to a lack of alignment between priorities and objectives. When asked what obstacles physical security professionals face when working with their organization’s IT department, top answers included:1) project prioritization and alignment, 2) conflicting objectives, and 3) project ownership/ division of labor. “Traditional physical security professionals often have a background in law enforcement or military. They’re well skilled in forensic investigations, executive protection, and physical security measures – guards, fences and alarms,” Arcement says, “On the other hand, the IT teams are traditionally more comfortable with data protection and cybersecurity measures, but they are not as comfortable in the physical domain, even with something like cards. Because these departments have evolved separately, the two face challenges in collaboration and communication.” Fortunately, progress in building stronger relationships is growing. When physical security professionals were asked how they currently work with their IT departments, a resounding 60% said that they collaborate to establish security best practices, with 55% indicating they look for new technologies together. Budget is another common concern for convergence projects. IT departments typically enjoy much larger budgets than physical security departments, and they’re used to re-

SecurityLink India ■ April 2018


white paper

ceiving funds for constant updates to keep up with advances in technology. Physical security departments, on the other hand, may invest in cameras and card systems that are expected to remain in place for decades. Such thinking is no longer practical as technology evolves and vulnerabilities are publicly revealed. Physical security equipment needs to be on a refresh rate closer to that in the IT industry.

able fear of needing to rip and replace existing systems to complete the upgrade. To illustrate this point, survey respondents were asked to identify their concerns regarding more converged PACS and LACS solutions. The top answer involved managing multiple credentials in various systems, which speaks to operational efficiency, whereas other top concerns included difficulty of implementation/ maintenance and increased technological complexity. Despite these challenges, understanding implementation best practices, leveraging modern technologies, and collaborating with trusted partners can facilitate the introduction of converged access control solutions more easily than ever.

Best practices to successfully launch convergence projects

T

Most convergence projects – 54% according to the ASIS survey – are shared in both the physical security and IT budgets, with 24% coming exclusively from the physical security budget and 22% from the IT budget. Physical security departments should work to leverage IT budget and justify their investments by highlighting improved risk management and asset protection to the organization. They should stress to leadership that a budget that covers convergence would enhance user experience, which can attract better employees and be used to differentiate the organization from its competitors. Convergence can also help mitigate risk, which is especially necessary in light of the recent high-profile hacks of companies including Home Depot, Target, and Equifax. “Executive leadership is willing to spend money to avoid similar outcomes for their organizations,” Arcement added, “There’s no guaranteed assurance, but they want to ensure they’re keeping up with risk mitigation best practices, which includes attention to both physical and cyber security.”

he primary technical challenge for organizations is the notion that introducing converged access control requires an interruptive rip and replace of existing technology. The reality, however, is that the process can be more simple such as by starting with converged cards. “We’re seeing a trend toward converged cards where it’s no longer exclusively the physical access control credential. Organizations are looking to either extend the contactless technology on the card or to embed an additional contact chip on the card for strong authentication to logical access applications as well,” Arcement continued. 72% of survey respondents indicate that they would like to leverage smart cards for additional applications, with the most useful including network and computer login. Beginning with a ‘converged card’ approach essentially adds logical access to an existing physical access control system. By doing so, organizations can create a migration path that increases security and convenience but still utilizes ex-

Technical challenges

M

any organizations may be hesitant to adopt a more converged access control system due to implementation concerns including establishing an upgrade path, compatibility with existing systems, and overall complexity of the upgraded solution. Furthermore, there is an understandSecurityLink India ■ April 2018

41


white paper

isting infrastructure, access control systems and panels. This allows more converged solutions to be implemented without needing to rip and replace, making upgrades to newer technology less disruptive. “In terms of logical access, this process usually includes adding credential management software solutions to the IT side of the house to manage the lifecycle of digital certificates on a single ID badge,” Loy said, “There can also be multiple integration points to help ease the workflow of getting those cards provisioned for desktop use, making it as streamlined as possible. Some providers also offer professional services to support whatever is needed to get the system running as quickly as possible.” Arcement also recommends that organizations first pilot the technology before deploying it company wide. “A marathon starts with one step, and it can be overwhelming to think about all the things that need to be done during the transition of an entire organization,” he said, “We have seen companies be most successful by structuring pilots and deployments in phases and by starting deployment in a single building, floor or department. This enables the project team to clearly understand the opportunities they have with the new technology, the limitations that may exist, and the policy changes that might be necessary to consider before deployment throughout the entire organization.” To overcome organizational challenges, increased collaboration between physical security and IT is key, particularly when budget is involved. Loy notes that while budget is a concern, the two departments can share expertise and information to be more cost effective. “Sometimes to get greater security you have to spend more money,” she said, “For example, companies typically spend under $10 on a card, but with a converged solution that card could cost $20. You must understand what you’re getting and why it’s more expensive, and you have to understand risks and associated risk tolerance. Think how expensive it will be if you become the next headline or ransomware attack versus making a change in your everyday security to shore up systems from a physical space and a digital space.” Bridging the communication gap between IT and physical security presents another opportunity for increased collaboration. To start, both sides should acknowledge their shared objective – the security of the organization – and recognize the expertise that each side has in the equation. Departmental leadership must understand that their security responsibilities are dependent on vulnerabilities on the other 42

side of the house, because it can mean entry points that ultimately threaten the overall organization. Facilitating a more collaborative environment can begin with physical proximity and project involvement. To start, IT and physical security can share a common work space such as an operations center or server room. These teams can also establish a recurring forum to provide updates, discuss vulnerabilities, and share audit data. Survey results shows that while 89% of respondents indicate they conduct a physical security risk analysis, only 2/3 of those respondents share the findings with their IT team. This collaboration should be leveraged to create joint proposals to company executives that show mutual benefit. For example, with increased convergence, ticket volume to the IT help desk will decrease due to a reduced need to reset passwords. Finally, once a convergence project begins, it is important to train users on the benefits of the new approach. Arcement offers, “Managing expectations is critical as organizations move to more secure technologies – there is a slight change to the user experience.” He compares it to shoppers adjusting to using smart card chips on their credit cards instead of magnetic stripe, noting, “At first, the change presented an inconvenience to the user, but cardholders accepted the change because they recognized the added security it provides in this age of identity theft. This offers a good analogy to share with your user population – that this transition is first and foremost designed to elevate security for the organization and all who occupy its facilities.”

Conclusion

P

hysical security and IT departments are recognizing that now, more than ever, converged threats are real. Vulnerabilities that exist in both domains are fronts that have traditionally been handled separately. In isolation, they can be viewed as managed risks. But when malicious attacks or simple carelessness connect these vulnerabilities, the risks become more than the sum of their parts. To meet the growing security needs of today’s organization, physical security and IT must better align their budgets and objectives to reduce risks while ensuring convenience so end users abide to company policies. While more converged physical and logical access technologies can help show the way, the ultimate responsibility lies within security professionals to chart the right course for their organization.

SecurityLink India ■ April 2018



application/ case study

GJD IP Detection Solution Protects AAA Coaches from Intrusion A

s part of a security upgrade from analogue to IP technology, AAA Coaches, a luxury coach and bus hire company based in Edinburgh, required a reliable IP security detection solution to protect their large open site perimeter. iFire UK, a family run business who are one of the leading installers of intruder alarms, fire alarms, CCTV and access control systems in Scotland, partnered with GJD and its local ADI Edinburgh branch, to provide a high quality IP system for AAA Coaches.

Challenge

A

AA Coaches required external IP motion detectors to protect the perimeter and integrate with Hikvision

cameras. The site included a variety of perimeters including fences and walls, as well as pedestrians and vehicles entering freely. The security solution had to be suitable for harsh weather conditions, while being extremely reliable, with no false alarms. The new system also had to be 44

of low maintenance and cost efficient.

Solution

i

Fire UK took all of AAA Coaches requirements into consideration and found the perfect solution with GJD’s D-TECT40 IP motion detectors. The D-TECT IP range seamlessly integrates over the network with Hikvision I series and K2 series NVRs. On this particular project, the I series was used to configure the IP detectors, so that when triggered by movement, the detectors automatically send a signal to alert the monitoring station. In addition to integrating with Hikvision, the D-TECT40 IP provided the site with a precise detection pattern and strong immunity to false activations. The IP detector settings can be changed remotely via the interface. Adjustable settings include the ability to alter the LUX level trigger, detection sensitivity and detection range. By using GJD’s IP based detectors, iFire created a future-proof site. The detectors enable the installer to create new actions and adjust settings over the network. Accessing the interface is quick and easy, with no requirements for additional installation or software, as the user simply logs in through a web address. The D-TECT40 IP has a programmable detection range up to 40m, makSecurityLink India ■ April 2018

ing it really easy to adjust the coverage if required. On the AAA Coaches site, iFire made the best out of the programmable detection feature, by setting the range at a variety of distances including 20m, 30m and 40m. As well as while creating IP event actions, an extra feature is the two volt free relay contacts, which allows the installer to connect devices that are not on the network. The D-TECT IP also utilises a single cabling point, which reduces the number of fittings and makes the install look neater. David Boyle, Director at iFire commented, “A number of D-TECT40 IP detectors have successfully been installed. Our customer, AAA Coaches is really impressed with their performance. This has resulted in additional GJD IP detectors due to be added on to the network.” David continued, “The installation was straightforward and it was really convenient to adjust the settings over the network. The ability to make changes over the network reduced physical site visits for our engineer, this resulted in significant cost savings to our company.” Karen Chapman, Assistant Branch Manager at ADI Edinburgh said, “We are delighted that we could help iFire UK provide a high quality IP solution for AAA Coaches.”

Conclusion

T

he use of GJD IP detectors with Hikvision’s NVR and cameras have provided AAA Coaches with a seamless IP perimeter protection system.


application/ case study

Heightened Security and Improved Prevention for Retail Establishments, Bakeries and Restaurants

V

ectron, a leading provider of point of sale systems for bakeries and restaurants, and MOBOTIX, a leading provider of digital, high-resolution and network-based video security systems, are offering a joint video solution for retail establishments, restaurants and bakeries. This involves linking the transaction data from the Vectron point of sale system for each sales process with video data from the MOBOTIX IP camera and storing it. This allows POS discrepancies to be quickly resolved, increases on-site security at retail locations, bakeries and restaurants, and boosts sales by enabling optimized shop planning based on integrated MOBOTIX video analysis tools.

Joining forces to resolve inventory variances

N

early €4 billion is lost yearly as a consequence of annual inventory differences in the retail sector in Germany alone, according to the EHI Retail Institute. In light of this, using the latest video security technology is a better option than ever. Moreover, when combined with classic protection measures, it opens up entirely new opportunities. This is where the joint solution from Vectron and MOBOTIX comes in. Transaction data from a point of sale is continually sent to a MOBOTIX camera in the form of POS events and linked with the camera footage in an intelligent way. The MOBOTIX Management Center (MxMC) 1.7 can be used to conveniently search through the saved POS data based on individual

criteria, and the respective corroborating image can be shown for each event. Users can evaluate video images saved in encrypted form from their office as well as from any additional MxMC workplace around the world – such as one at company headquarters – through a secure Internet connection. POS processes can be analyzed based on item, price or employee, among other criteria. MxMC displays the relevant camera footage for the respective transaction and includes practical search functions. This enables users to securely document and review disputed cash transactions. In addition to using the features provided by MxMC, users can also directly view the latest transaction in the browser of the Vectron POS system. As such, the joint solution from Vectron and MOBOTIX helps users quickly resolve POS differences, and also has a loss preventative effect.

Optimizing sales and security

I

f a company is using a hemispheric MOBOTIX camera with MxAnalytics (such as the Q26), objects as well as people can also be counted, and their movements can be depicted in a heat map. This provides retailers with additional customer-specific information such as the duration of stay, movements in the opposite direction, turns, very fast movements or entry into defined areas. This information provides retailers with key added value. Based on the optimal SecurityLink India ■ April 2018

overview they receive, as well as the movement heat map and the transaction data, companies can optimize personnel deployment and shop design. All in all, companies benefit from this solution: It increases on-site security, minimizes costs and helps boost sales by enabling optimized shop planning based on video analysis data. The solution was also specially developed to accommodate the requirements of the new European General Data Protection Regulation (GDPR). As such, it enables companies to carry out POS analysis compliant with this new data protection legislation.

Technical specifications

T

he solution can be used with MxManagement Center 1.7 or later and is compatible with all current Vectron POS systems and MOBOTIX Mx6 cameras (firmware version MX-V5.0.2.14 or later). The MxAnalytics video analysis tools are part of the complete solution and do not require any additional costs or infrastructure. 45


application/ case study

Enhancing Security at Jang Su Jang Restaurant, US L

ocated in Milpitas, California, Jang Su Jang restaurant offers high quality, authentic Korean cuisine offering an extensive menu to satisfy even the pickiest taste buds. Their main goal is to provide delicious meals served with great service in a clean, modern and upscale environment. Management acknowledges that security plays a crucial role influencing sustainability of operations. The primary objective of a security overhaul including maintenance with camera additions and upgrades will allow management to monitor staff, provide overall coverage of dining areas as well as entrances and exits.

Challenge

V

IVOTEK’s camera deployment was crucial to assist management in the day-to-day operations of the restaurant. Remotely monitoring employees, customer disputes, damage to customer property and car break-ins are all concerns upper management must address. Also, being able to monitor the main dining areas, assist hosts with seating and table occupancy and camera in-

46

stallations always provide security during non-business hours.

Solution

S

ince 2015, management at Jang Su Jang restaurant have always wanted, at a security level, no blind spots left uncovered in the kitchen and dining areas. At the same time, it is critical to maintain the restaurant’s upscale design, making sure cameras are discrete but fully functional. The new video surveillance system features twelve VIVOTEK network cameras including a 16-channel network video recorder, ND8401. FD816BA-HT 2 megapixel fixed dome network camera is equipped with a full HD sensor enabling a viewing resolution of 1920x1080 at 30fps. Featuring WDR Pro and supreme night visibility technology, this camera can capture high quality and high visibility video in high contrast or low light environments. As a professional day/ night camera, the FD816BA-HT features a removable IR-cut filter as well as IR illuminators effective up to 30 meters for superior image quality around the clock making this camera a perfect fit for overall coverage of the main dining area. Following with the FE9191 H.265 fisheye network camera was used to cover the large banquet area. Covering 360° surrounding view, restaurant staff has no blind spots and can easily run the floor without having to constantly walk the area. The 12 megapixel camera guarantees superb image quality utilizing the latest in panomorph lens technology SecurityLink India ■ April 2018

for 180°panoramic view (wall mount) or 360° surround view (ceiling/ wall/ floor mount). Armed with a removable IR-cut filter and WDR Enhancement technology, the camera can maintain optimal image quality around the clock for unparalleled visibility under high-contrast lighting environments. Jang Su Jang’s kitchen area was outfitted with FE8174V, VIVOTEK fisheye network camera featuring 5 megapixels. Fianlly, the FD8134 fixed dome network camera completed the deployment and was installed at various exits and entrances, hallways and the cash register area. Specifically designed for indoor applications with its compact and stylish exterior, FD8134 allows discrete surveillance by capturing high quality, high resolution video. In addition to completely outfitting the property in VIVOTEK cameras, the restaurant uses VAST as the central management software designed to manage all surveillance products. VAST allows owners to operate their business efficiently on premises or remotely.

Customer feedback

When we originally started improving our security system, we chose VIVOTEK cameras and were continually impressed with the quality and reliability, we continued to do upgrades as new VIVOTEK equipment was released. Delicious, quality food is not our only priority, safety is also fundamental to our business. Our staff and customers well-being is of immense importance and helps our business operations run smoothly,” said Brian Chung, Manager of Jang Su Jang restaurant.


application/ case study

Access Control Data Centre Solution D

ata centers is a challenging domain where the success depends on the security of client data. Most data centers store data for more than one organization. It is very crucial for them to prevent any unauthorized access of data. Matrix offers a solution whereby data racks are secured biometrically, with records of every access along with its duration. Only authorized person can access specific racks for the stipulated time using biometric verification. The solution is available in two forms, the process of which is listed below:

Solution 1: Time based rack access with single biometric device

●● Data centre authentication: User shows biometric credentials to access the data centre. ●● Data centre access allowed: Once user is allowed Access, he/ she will move towards rack access authentication. ●● Rack authentication: User will click on the screen and authenticate his/ her identity through a biometric device placed alongside the screen. ●● Rack selection: Once user completes the authentication process for gaining access to respective racks, he will be able to select the racks to be accessed from a list of accessible racks. ●● Rack access allowed: Finally, the user will perform his assigned task within the defined time period.

Solution description The features mentioned below enhance security of data centers: ●● Centralized biometric authentication: Biometrics provides high-end security over RFID, and hence integrating biometrics with access control solution fetches complete security for data centers. Usually, an employee is required to punch twice in order to access the data rack of his/ her organization. ²² First punch: A biometric device will be installed at the entrance of the data centre. A user will punch on the device and accordingly he/ she will be granted/ denied access. This authentication ensures that an authorized user is trying to access the data center. ²² Second punch: Once user is granted access, he/ she will punch again at the device installed near the screen in order to access the respective racks. Once user punches, the screen will display the list of racks that he/ she is allowed to access. For example, when ‘X’ employee of ‘ABC organization’ punches second time, the screen will display a list of ABC Organization racks that are allotted to him. The user then needs to select the racks that he wants to access and accordingly he/ she will be granted access. ●● Pre-defined rack access: Every company has designated racks allotted to them. Admin can define the racks company-wise, which means whenever a user makes his second punch, a list with racks allotted to his/ her respective company will be displayed on the screen. ●● This feature acts as a USP for data centers as they can ensure that a rack of company ‘X’ will not be accessible to or misused by an employee of company ‘Y.’ ●● Rack accessible for a defined time period: Every rack that is allocated to a company can only be accessed for a definite period of time. Admin can set the duration and accordingly users can access their respective racks for the stipulated time period.

SecurityLink India ■ April 2018

47


application/ case study

Connectivity diagram

ers. Usually, an employee needs to punch twice in order to access the data rack of his/ her organization. ²²First punch with two level authentication: A biometric device will be installed at the entrance of data center. User will show card or enter the pin code and then biometric credential on the device and accordingly he/ she will be granted/ denied access. This authentication ensures that an authorized user is trying to access the data center. Two level authentication improves the security level. ²²Second punch: User will move to the rack and show his/ her biometric credential on the device installed at the rack. If the user is au-

Solution 2: User based rack access with multiple biometric device

thenticated he/ she will be allowed to work in the rack for a predefined period of time and once finished, the device will close the door automatically. ●● Predefined rack access: Every company has designated racks allotted to them. Admin can define the racks company-wise, which means whenever a user makes his second punch – a list of ABC Organization racks that are allotted to him will be displayed on the screen. ●● This feature acts as USP for data centers as they can ensure that a rack of company ‘X’ will not be accessible to or misused by employee of com-

●● Data centre authentication: User shows biometric credentials to access the data centre. ●● Data centre access allowed: Once user is allowed access, he/ she will move towards rack access authentication. ●● Rack authentication: User will show biometric credentials to access the rack.

●● Integration with video surveillance: Matrix access control solution for data centers can be integrated with the video surveillance solution. hence, when a user tries to access the data centre through the biometric device, an image gets captured. In case of unauthorized access, having an image can prove helpful for data centers.

Solution description The features mentioned below enhance security of data centers: ●● Centralized biometric authentication: Biometrics provides high-end security over RFID, and hence integrating biometrics with access control solution fetches complete security for data cent48

pany ‘Y.’

●● Rack accessible for a defined time period: Every rack that is allocated to a company can only be accessed for a definite period of time. Admin can set the duration and accordingly the rack will be accessible for the pre-defined time period.

SecurityLink India ■ April 2018


application/ case study

Connectivity Diagram

Reports The solution provides reports in the form of: ●● ‘Which’ rack is accessed by ‘whom,’ ‘when’ and for ‘what’ time-duration. ●● Records related to rack accessibility, time duration etc. ●● Alarm for a rack held open for too long, access denied events etc.

Benefits ●● ●● ●● ●●

Application

●● ‘Data Rack’ management: Data centers have data of more than one organization stored in a single location. Managing the data racks is a cumbersome process for data centers. Through this solution, data centers can manage each and every company’s rack virtually along with enhancing the security.

From data centre point of view: Easy maintenance of diverse data. Accurate record of access allowed/ denied in the software. No manual security required. Easy data rack management of various companies in a single location.

From companies point of view:

●● Complete security of company data. ●● Accurate records of who accessed data at what time.

Target user profile:

●● Data centers ●● Server based companies.

Saves Texans from a Potentially-Deadly House Fire A

DT Inc. celebrated one of its LifeSaver events in Lubbock, TX where ADT Customers Garland and Barbara Schoor were reunited with rescuers who helped save them from a potentially deadly fire. The scary incident happened around midnight on February 1 as the Schoors were soundly sleeping in their home of over 40 years. What they didn’t realize was that a fire had broken out and was quickly filling the house with smoke. “The phone call from ADT woke me up,” said Barbara Schoor, “I could see flames and told the ADT dispatcher to call the fire department while I tried to

get my husband out of bed.” According to Barbara, Garland is 85 years old and wasn’t using his hearing aids so it took time to wake him up. Once that happened, both quickly exited as flames engulfed the home. First responders from the Shallowater Fire Department spent about four hours putting out the blaze. While the house was left standing, it was nearly gutted and most of the contents were destroyed. “When fires occur in the middle of the night, the probability of occupants not being aware goes up significantly” said Shallowater Fire Chief Cory Buck, SecurityLink India ■ April 2018

“I am thankful the Schoors had a monitored security system that notified them. Had that not occurred, this incident could’ve turned out differently with a tragedy instead of a celebration.” To celebrate the successful outcome, ADT flew dispatcher Josh Edenfield several hundred miles from ADT’s customer care center in Tennessee to meet the Schoors in person. “As a former police officer, I am used to helping people,” Edenfield said, “It was awesome being able to help save the Schoors in my new job at ADT.” ADT also awarded $5,000 to the Shallowater Fire Department. 49


application/ case study

Protecting Telecom Italia Mobile’s Data Center S

ightLogix smart thermal cameras are providing data center physical security for Telecom Italia Mobile (TIM) in Acilia Rome, Italy. CRISMA Security, a Rome-based security integrator and SightLogix certified partner, designed and implemented the smart data center physical security system. TIM’s data center boasts an international reputation as one of the most innovative and dependable facilities of its kind. The Tier IV level facility has

earned the highest degree of certification awarded by the Uptime Institute, earning a 99.995% reliability rating. Just as important is their commitment to protecting the data for millions of customers. Yet providing physical security for the data center’s 3,500 square meter building, which resides on large grounds of nearly 57 acres (23 hectares), represented a tough challenge. TIM needed a powerful security system that would alert on-site guards the instant an intrusion occurred over the entire premises, without burdening their efforts with excess nuisance alarms. 50

Smart thermal cameras and data center physical security

L

ooking to enhance their data center’s physical security, CRISMA suggested TIM move from a passive security posture to a pre-emptive automated approach using a radar system along with SightLogix SightSensors. SightSensors are thermal cameras with integrated video analytics that automatically detect intruders over large outdoor sites with high accuracy and low costs. SightSensors offered TIM several capabilities that made them an excellent choice for protecting the physical security of the data center. As thermal cameras, they detect intruders with great reliability day and night, ignoring noncritical movement outdoors to accurately detect people and send credible alerts when an intrusion occurs. By using a very high level on onboard processing, a single SightSensor can cover very large distances – more than several football fields per camera – while ignoring the movement of small

SecurityLink India ■ April 2018

animals, blowing trash, or other issues which cause nuisance alarms for lesseffective solutions. They integrate seamless with existing systems, and offer the configuration flexibility, low esthetic impact, easy installation and minimal ongoing system maintenance that was critical to TIM’s requirements. Another compelling aspect for TIM was the SightSensor’s geo-registered capabilities, which assist with video analytic accuracy and are also used to project the location of intruders onto a topology map in real time. This means that TIM’s security personnel can be alerted with automated alarms from all areas of the site and can direct their security response to the precise location where the intrusion is occurring.

The benefits

W

ith the SightLogix smart thermal solution in place, intruders that violate video analytic rules immediately trigger an alarm, sending video of the event and the target’s precise GPS location. This allows security personnel to quickly understand the nature of the threat to implement the most effective response. Because the SightLogix system protects large areas with minimal nuisance alerts, TIM has been able to create a blanket of awareness around the entire grounds. According to Crisma Security, the data center physical security solution has also returned sizable financial benefits. The large perimeter has been secured using a low number of long-range SightSensors, allowing for a great reduction in infrastructure when compared to alternatives.


application/ case study

Korea Telecom selects Gemalto Major US Airport Delivering Out-of-Box Connectivity for Connected Cars

G

emalto has been selected by Korea Telecom (KT) Corporation to provide its On-Demand Connectivity (ODC) solution and embedded SIM (eSIM) to deliver out-of-box connectivity to its industrial IoT customers. This will enable the largest South Korean telecommunications provider to support all cars equipped with pre-embedded eSIM complete flexibility over subscription management, regardless of their country of origin. Gemalto hosts and maintains the IOT connectivity solution in its certified data center. It is compliant with the GSMA remote SIM provisioning specifications and it integrates with KT’s connected car platform called GiGA drive. By combining Gemalto’s remote subscription management solution with its eSIM, KT will be able to allow automobile manufacturers to provide in-vehicle connected services through GiGA drive and a single SIM, which can be remotely provisioned with the profile of a mobile operator once the car is shipped or at the end of a contract. “Gemalto’s solutions will help strengthen our partnerships with 13 major automotive brands in 6 major countries to drive the adoption of our GiGA drive platform, as well as open doors for us to actively participate in upcoming connected car programs around the world,” said Kangrim Choi, Vice President & Head of Connected Car Business, KT, “Gemalto is a natural choice for us given its proven track record for its GSMA-certified solution. We believe that its out-of-box connectivity for IoT devices and our recent win to provide the 5G network powering the driverless shuttle at the Pangyo Zero City in South Korea will help us attain our goal of being a market leader in the new connected car era.” “Adoption of eSIM and ODC will continue to grow as more OEMs use them to ensure that their connected devices deliver seamless connectivity while enabling convenience and new mobility services,” said Sashidhar Thothadri, Senior Vice President, Mobile Services & IOT Asia, Gemalto, “We hope this collaboration will offer insights for OEMs and other mobile network operators to adopt such technology to drive the success of the Internet of Things.” SecurityLink India ■ April 2018

Protected

Multiple Senstar Systems Installed Multi-layer intrusion detection solution creates one of Senstar’s largest ever single-facility projects

S

enstar has delivered the perfect perimeter intrusion detection (PIDS) solution to protect the perimeter of one of North America’s largest cargo airports. Due to the facility’s unique perimeter security requirements, Senstar combined multiple technologies to form a comprehensive system that effectively protects the airport and keeps the nuisance alarm rate (NAR) low. “With a busy road running along one side of the airport’s five-mile perimeter, and people using the airport’s fence to lean on while waiting at bus stops, a fence-mounted solution alone would have been an NAR nightmare,” said Nancy Marshall, Senstar’s Executive Director of Business Development, “By combining multiple technologies, we created a system in which a single alarm is not enough to trigger a response, but, if multiple alarms are received, the threat is deemed to be real and a response is initiated.” Working with A&E firm Faith Group LLC and installer Standard Electric, the multi-layer intrusion detection system has been up and running for several months and the airport is very pleased with the results. “It was an excellent experience,” said the Airport’s Project Lead, “Standard Electric was very confident in the (Senstar) products. They told us to ‘Relax. We are going to do this right and you’re going to be extremely satisfied.’ And we are.” 51


application/ case study

Secures LMI Systems L

MI Systems, Inc. is an OnSSI Platinum channel partner in Tucker,

Georgia that installs Ocularis systems and other security technology across

 The police were amazed that we were able to provide them with footage right there on the spot, before they’d even asked. The police were able to print the shots of the footage out, make a traffic stop for a suspicious vehicle, and ID them with the photos we had from our security system. We caught them only five days after the incident. The police told us that if it weren’t for the camera footage that LMI provided them, they wouldn’t have caught them  – Scott Godwin President & CoOwner, LMI Systems, Inc.

52

SecurityLink India ■ April 2018

North America. Beginning as an electrical contractor, LMI now spans eight disciplines in the telecommunications, electrical and electronic safety and security industries and has become one of the top systems integrators in the state of Georgia. It’s not often that a security company gets a first-hand chance to test out their products, but that’s exactly what happened when a break-in occurred at the LMI’s Georgia facility. Solution LMI runs a 31 camera system throughout their facility and parking lots on OnSSI’s Ocularis 5 enterprise video management system (VMS), capturing high-definition video 24/7 at the company’s 61,000 square feet Tucker facility. LMI utilizes Ocularis 5, the latest version of the Ocularis VMS, for a fresh approach to managing camera integrations, data storage handling, and recorder management, based on a new recorder technology that accommodates a significantly higher density of camera per recorder white maximizing HDD storage, with the need for user configuration.

Result

O

n August 3, 2017, LMI’s Ocularis system came in handy when the building was robbed by a pair of suspects who smashed through the facility’s front door. “We have 30 or 40 TVs in the facility and they stole 13. The perpetrators also took laptops, a camera system, some personal items, and even a golf putter. The cost to the company was over $25,000 in damage and stolen property,” said Mr. Goodwin. Thanks to their Ocularis system, the burglary was met with a lightning fast reaction from LMI. The three-megapixel Sony cameras installed at the facility


application/ case study

Dayton Church Catches the Bad Guys with Verified Video Surveillance Industry-leading video and audio verification technology provided police responders with real-time situational updates to enhance officer safety and ensure faster apprehension

3

grabbed crystal-clear images of the suspects and their vehicle, which law enforcement used to apprehend one of the two suspects almost immediately. The VMS provided LMI with instant access to the video of the breakin, without the need to scrub through hours and hours of video to find the appropriate timestamp. Using the Ocularis system, LMI operators were able to pull the footage, put it in chronological order, and download it to a flash drive for the police in only 30 minutes. Mr. Goodwin credits the Ocularis’ thumbnail search feature specifically for the speed with which LMI operators were able to find the appropriate video data. When they were apprehended, the assailants had broken into four more buildings, none of which had security footage of high enough quality to assist in the identification of the suspects. With Ocularis continuing operations at their facility, LMI plans to maintain their high-level of security and expand their system in the future to include features such as license plate recognition. While they were already strong advocates for the VMS, the incident has made them ever bigger enthusiasts. “The Ocularis system is what caught the perpetrators,” concluded Mr. Goodwin.

xLOGIC, Inc., a leading provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500™ winner, has announced that Northwest Church of Christ in Dayton, Ohio was broken into recently and Sonitrol of SW Ohio, using technology from 3xLOGIC, worked with local law enforcement to apprehend the intruder and prevent damage or theft from the facility. The church is located in a rough part of town, with a large homeless population. Church of Christ has installed multi-sensor devices connected to the Sonitrol Central Station to provide an active, visible deterrent to break-ins. Unfortunately, the church was undergoing renovations and someone left a door unlocked. Immediately upon entering, the perpetrator was detected by the multi-sensor devices and the Sonitrol operator was able to verify the intrusion within seconds using motion, video and audio sensors, and then contact the dispatcher for local law enforcement. The church is a large building with many entrances, so responding police officers needed all the assistance they could get. The Central Station operator provided a steady stream of information updates to ensure real-time coordination with the law enforcement officers on the scene. The operator was able to guide the police to the suspect’s exact location, give a description of the suspect, and facilitate an apprehension before there was any damage or loss of assets. In addition to the multi-sensor devices, the church has a number of 3xLOGIC outdoor cameras tied to a VIGIL NVR. “This was a great success story,” commented Alison Shiver, Marketing Manager, Sonitrol SW Ohio, “The church was quite pleased with this apprehension, because it sends a clear message to the neighborhood – don’t mess around, you’re going to get caught.” SecurityLink India ■ April 2018

53


application/ case study

& Launch Senate Bill 507 Video Surveillance Solution for Texas Schools ikvision USA Inc., the world’s leading provider of artificial intelligence, machine learning, robotics and other emerging technologies, and manufacturer of video surveillance products and solutions; and Eagle Eye Networks, the leading global provider of cloud-based video surveillance solutions addressing the needs of businesses, schools, alarm companies, security in-

H

viewed on multiple devices. This low-cost, easy-to-use cloudbased solution meets all the criteria of the new law providing peace of mind to students, parents and staff. It is available immediately. The requirements set forth in SB507 are as follows: ●● School districts must install audio and video monitoring equipment in

tegrators and individuals, have recently introduced a video surveillance solution that enables Texas school districts to immediately comply with the video surveillance requirements set forth in Texas Senate Bill 507 (SB-507). The SB-507 video surveillance solution combines Hikvision’s high-performance indoor IP dome camera with Eagle Eye's Cloud Security Camera VMS for high resolution images that can be

any classroom where special education services are being provided for at least 50 percent of the time. ●● The camera equipment must be capable of recording audio in all areas of that setting. ●● School districts are required to store the video/ audio recordings for at least 90 days. ●● If video clip is requested, it must be available for the school district to re-

54

SecurityLink India ■ April 2018

view within 48 hours. Features of the SB-507 video surveillance solution include: ●● Video and audio storage for 90 days. ●● Video-sharing capability from any Internet-connected device. ●● Mobile app for access to historic or live footage on-the-go. ●● Cyber-secure video highly resistant to being hacked. ●● High-definition IP cameras. ●● Restricted user permissions on a camera-by-camera basis. ●● Quick and easy installation. ●● Customized alerts (motion, intrusion etc). “Hikvision is pleased to work with partners like Eagle Eye to provide solutions that make a positive impact for teachers, parents and families,” said Alex Asnovich, Head of Marketing, Hikvision North America. The SB-507 video surveillance solution is currently deployed at a major school district in Texas, and several school districts are following suit. This solution that can be deployed in just less than a day enables easy search, retrieval, and sharing of relevant video clips 24/7. “We are pleased to be supporting Texas School Districts with this enhanced video surveillance solution,” said Dean Drako, CEO and Founder of Eagle Eye Networks, “We look forward to working with more and more school districts to help them meet their security needs while also creating a safer environment for students, parents and staff.”


feature

Advanced Threat Landscape Report 2018 46 percent of organizations fail to change security strategy after a cyber attack

C

yberArk survey shows organizations are failing to secure privileged accounts and credentials in the cloud, on endpoints and across IT environments. According to the CyberArk Global Advanced Threat Landscape Report 2018, nearly half (46 percent) of IT security professionals rarely change their security strategy substantially – even after experiencing a cyber-attack. This level of cyber security inertia and failure to learn from past incidents puts sensitive data, infrastructure and assets at risk.

Security starts with protecting privileged accounts

A

n overwhelming number of IT security professionals believe securing an environment starts with protecting privileged accounts – 89 percent stated that IT infrastructure and critical data are not fully protected unless privileged accounts, credentials and secrets are secured. Respondents named the greatest cyber security threats they currently face, including: ●● Targeted phishing attacks (56 percent), insider threats (51 percent), Ransomware or malware (48 percent), unsecured privileged accounts (42 percent), unsecured data stored in the cloud (41 percent). ●● IT security respondents also indicated that the proportion of users who have local administrative privileges on their endpoint devices increased from 62 percent in 2016 survey to 87 percent in 2018 – a 25 percent jump and perhaps indicative of employee demands for flexibility trumping security best practices.

The inertia that could lead to data compromise

T

he survey findings suggest that security inertia has infiltrated many organizations, with an inability to repel or contain cyber threats – and the risks that this might result in – supported by other findings: ●● 46 percent say their organization can’t prevent attackers from breaking into internal networks each time it is attempted; ●● 36 percent report that administrative credentials were stored in Word or Excel documents on company PCs; ●● Half (50 percent) admit that their customers’ privacy or PII (personally identifiable information) could be at risk because their data is not secured beyond the legally-required basics.

Inertia and a ‘Hands-Off’ approach to securing credentials and data in the cloud create cyber risk

T

he automated processes inherent in cloud and DevOps mean privileged accounts, credentials and secrets are being created at a prolific rate. If compromised, these can give attackers a crucial jumping-off point to achieve lateral access to sensitive data across networks, data and applications, or to use cloud infrastructure for illicit crypto mining activities. Organizations increasingly recognize this security risk, but still have a relaxed approach toward cloud security. The survey found that: ●● Nearly half (49 percent) of organizations have no privileged account security strategy for the cloud; ●● More than two-thirds (68 percent) SecurityLink India ■ April 2018

defer on cloud security to their vendor, relying on built-in security capabilities; and ●● 38 percent stated their cloud provider doesn’t deliver adequate protection.

Changing the security culture

O

vercoming cyber security inertia necessitates it to become central to organizational strategy and behavior, not something that is dictated by competing commercial needs. According to the survey: ●● 86 percent of IT security professionals feel security should be a regular board-level discussion topic; ●● 44 percent said they recognize or reward employees who help prevent an IT security breach, increasing to nearly three quarters (74 percent) in the U.S.; and ●● Just 8 percent of companies continuously perform Red Team exercises to uncover critical vulnerabilities and identify effective responses. “Attackers continue to evolve their tactics, but organizations are faced with cyber security inertia that is tipping the scales in favor of the attacker,” said Adam Bosnian, Executive Vice President, Global Business Development, CyberArk, “There needs to be a greater urgency in building cyber security resilience to today’s attacks. This starts by understanding the expanding privileged account security attack surface and how it puts an organization at risk. Successfully battling inertia requires strong leadership, accountability, clearly defined and communicated security strategies, and the ability to adopt a ‘think like an attacker’ mindset.” 55


feature

Safeguards for Securing Virtualized Servers T

his bulletin outlines the security recommendations that NIST recently provided in Special Publication (SP) 800-125A – security recommendations for Hypervisor Deployment on Servers. The document provides technical guidelines about the secure execution of baseline functions of the hypervisor, regardless of the hypervisor architecture. In the past, a user wishing to set up a computing server generally needed to use a dedicated host with dedicated resources such as a central processing unit (CPU), memory, network and storage. Modern systems have technology that lets one create virtual machines to emulate what used to be physical, dedicated resources. This practice is known as virtualization and supports more scalable and dynamic environments. A critical component of this technology is the hypervisor, the collection of software modules that enables this virtualization and thus enables multiple computing stacks – each made of an operating system (OS) and application programs – to be run on a single physical host. Such a physical host is called a Virtualized Host and is also referred to as a Hypervisor Host. The individual computing stacks are encapsulated in an artifact called a Virtual Machine (VM). To make a VM an independent executable entity, its definition should include resources such as CPU and memory, allocated to it. The VMs are also called ‘Guests,’ and the OS running inside each of them is called ‘Guest OS.’ The resources associated with a VM are virtual resources, as opposed to physical resources associated with a physical host. The hypervisor forms part of the virtualization layer in a virtualized host and plays many of the same roles that a conventional OS does on a non-virtualized host, or server. Just as a conventional OS provides isolation between the various applications, or processes, running on a server, the hypervisor provides isolation between one or more VMs running on it. Also, like an OS, the hypervisor mediates access to physical resources across multiple VMs. Therefore, all other functions needed to support virtualization – such as emulation of network and storage devices and the management of VMs and the hypervisor itself – can be accomplished using kernel-loadable modules, although some hypervisor architectures accomplish these tasks using dedicated VMs. The hypervisor can be installed either directly on the hardware, 56

or bare metal (Type 1 Hypervisor), or on top of a fullfledged conventional OS, called Host OS (Type 2 Hypervisor). Here, we discuss the baseline functions of a hypervisor, how these functions are distributed in a hypervisor, and how this information is used to develop security recommendations that provide assurance against potential threats to the secure execution of tasks involved in the hypervisor’s baseline functions.

Hypervisor baseline functions

I

t might appear that all activities related to the secure management of a hypervisor and its hardware host – collectively called the hypervisor platform – should simply consist of established best practices for any server class software and its hosting environment. However, closer examination reveals that the unique functions provided by the Hypervisor Platform require a dedicated set of security considerations. These functions are called hypervisor baseline functions (HY-BF) and are labeled HY-BF1, HY-BF2, HY-BF3, HYBF4, and HY-BF5. They are described below:

HY-BF1: VM process isolation

S

cheduling of VMs for execution, management of the application processes running in VMs (e.g., CPU and memory management), and context switching between various processor states during the running of applications in VMs;

HY-BF2: Devices mediation & access control

M

ediates access to all devices (e.g., network interface card [NIC], storage device such as IDE drive etc). One mediation approach is to emulate network and storage (block) devices that are expected by different native drivers in VMs by using emulation programs that run in the hypervisor kernel;

HY-BF3: Direct execution of commands from guest VMs

C

ertain commands from Guest OSs are executed directly by the hypervisor instead of being triggered through in-

SecurityLink India ■ April 2018


feature

terrupts and context switching. This function applies to hypervisors that have implemented para-virtualization instead of full virtualization;

HY-BF4: VM lifecycle management

T

his baseline function involves all functions from creation and management of VM images, control of VM states (start, pause, stop etc), VM migration, VM monitoring, and policy enforcement; and

HY-BF5: Management of Hypervisor

T

his baseline function involves defining some artefacts and setting values for various configuration parameters in hypervisor software modules including those for configuration of a Virtual Network inside the hypervisor. NIST SP 800-125A provides detailed security guidance based on an analysis of threats to the integrity of all the above functions. The only exceptions are the set of guidelines for configuration of virtual network (subset of HYBF5), which are covered in a separate document (NIST SP 800-125B). The above functions are carried out by different hypervisor components, or software modules. There are some minor differences among hypervisor products in the way that they distribute these functions. The mapping of these functions to hypervisor components and the location of these components within a hypervisor architecture are described in the table below: Baseline Function

Component (Software Module)

Location

VM Process Isolation (HY-BF1)

Hypervisor Kernel

Either an OS kernel (along with a kernel module) itself or a component installed on a full-fledged OS (Host OS)

Devices Mediation and Access Control (HY-BF2)

Device emulator or Device driver

Either in a dedicated VM (called Device-driver VM) or in the hypervisor kernel itself

Direct Execution of Commands from Guest VMs (HY-BF3)

Hypervisor Kernel

Pertain to only paravirtualized Hypervisors and handled by hypercall interfaces in that type of hypervisor

VM Lifecycle Management (HY-BF4)

A management daemon

Installed on top of hypervisor kernel but runs in unprivileged mode

Management of Hypervisor (HY-BF5)

A set of tools with CLI (command line interface) or a GUI

A console or shell running on top of hypervisor kernel

Approach for developing security recommendations

D

eveloping security recommendations for the deployment and use of a complex software such as the hypervisor requires knowledge of potential threats which, when exploited, would affect the three basic security properties – confidentiality, integrity, and availability – of hypervisor functions. The approach adopted for developing security recommendations for the deployment of hypervisors in NIST SP 800125A is as follows: ●● Ensure the integrity of all components of the hypervisor platform, starting from the host BIOS to all software modules of the hypervisor. This action is accomplished through a secure boot process, outlined as recommendation HY-SR1; ●● Identify the threat sources in a typical hypervisor platform. The nature of threats from rogue or compromised VMs is briefly discussed in SP 800-125A; and ●● For each of the five baseline functions HY-BF1 through HY-BF5 (except for HY-BF3, the direct execution of certain commands from guest VMs by the hypervisor), identify the different tasks under each function, and for each of the tasks, identify the potential threats to the secure execution of the task. The countermeasures that will provide assurance against exploitation of these threats form the basis of the security recommendations. The threat related to HY-BF3 emanates from a hypervisor design vulnerability that must be addressed through proper validation and testing of the relevant hypervisor code, not through configuration or deployment procedures, which is why this type of threat is not addressed through any security recommendation in SP 800-125A. In the case of some large open source and commercial software environments (e.g., a database management system [DBMS] platform), the approach for secure deployment and usage is to study the reports published in public vulnerability databases for various product offerings, look for available patches from the software vendor, review online public resources, and seek out recommended security configuration settings. This approach was not adopted in NIST SP 800-125A because the intended purpose was to provide security recommendations for the entire product class based on its baseline functions instead of a specific open source or commercial hypervisor product offering.

SecurityLink India ■ April 2018

57


feature

Summary of Security Recommendations

Global Access Management Market to Double by 2021

T

he hypervisor is a complex server class software that virtualizes hardware resources to enable the execution of multiple computing stacks (VMs) with heterogeneous OSs and multiple applications hosted within them. Secure configuration of the hypervisor, together with its physical host (either hypervisor host or virtualized host) – collectively called the hypervisor platform – is needed to provide a safe platform for the execution of mission-critical applications. Because the architecture of a hypervisor can be classified in many ways, the approach taken in NIST SP 800-125A is to identify the five baseline functions that a hypervisor performs, the tasks involved in each baseline function, the potential threats to the secure execution of any of these tasks, and the countermeasures that provide assurance against these threats in the form of security recommendations. Overall, NIST SP 800-125A provides 20 security recommendations for the secure deployment of hypervisors. All but two (HY-SR-1 and HY-SR-2) relate to the configuration parameters of software modules in the hypervisor platform. These parameters include integrity metrics for software modules (e.g., device drivers and VM images), the setting of access controls (e.g., device access, VM image access, and VM administration), and the configuration of secure protocols (e.g., VM image server access and VM migration). Ramaswamy Chandramouli, Larry Feldman and Greg Witte, Editors Computer Security Division Information Technology Laboratory National Institute of Standards and Technology U.S. Department of Commerce

58

Revenue to Reach Nearly $10 Billion By Don Tait – Senior Analyst, Cyber and Digital Security, IHS Markit

A

ccess management can be defined as the process of granting authorized users the rights to use a service, while preventing access to non-authorized users. Following are the key access management growth factors over the next five years.

GDPR deadline fast approaching

T

raditionally, finance, banking, insurance, government, utilities and other heavily regulated end-user sectors have focused on identity- and accessmanagement solutions. However, over the past year there has been growth in non-traditional markets. Not only have the manufacturing and retail sectors become more security conscious, but the increase in the number of data breaches and the looming legislation around General Data Protection Regulation (GDPR) in May 2018 has also piqued renewed interest in security and identity and access management (IAM) solutions.

Smaller organizations using access management solutions

A

ccess management solutions have traditionally been deployed by larger organizations. In fact, companies with 5,000 or more employees are projected to contribute the largest revenue SecurityLink India ■ April 2018

growth over the next five years, increasing from $4.38 billion in 2016 to $5.4 billion in 2021. The proportional importance of this segment is forecast to decline from 80 percent of total access management revenue in 2016 to around 56 percent in 2021. Small and medium-sized enterprises (SMEs) will steadily increase the amount of access management solutions they deploy. For example, revenue from companies with between 1 and 499 employees is projected to increase from $109.6 million in 2016 to $705 million in 2021. This segment managed to grow from 2 percent of total revenue in 2016 to 7.3 percent in 2021. The introduction of more cloud solutions within the access management market is likely to help SMEs, in particular, because cloudbased access management solutions can be more cost effective and scalable for small and medium enterprises.

On-premises hybrid and cloud solutions

A

s there are still a lot of applications running on premises at companies, a significant portion of larger organizations still want some on-premises solutions. Larger organizations are more likely to move to a hybrid model, with some applications running in the cloud


feature

as a stepping stone toward full adoption of cloud solutions. Hybrid solutions are projected to increase from $1.1 billion in 2016 to $1.7 billion in 2021. In contrast, smaller organizations are more likely to deploy software-as-a-service (SaaS) solutions, which for them can be more cost effective than on-premises solutions.

Technological developments and the battle with hackers

T

here is a continuous battle being waged as hackers increasingly try to gain control of the networks they want to compromise. It is important for organizations to take into account people’s locations, to help detect fraudulent activity and ensure the right people have the right access, at the right time and at the correct location. Technologies like machine learning (ML) and artificial intelligence (AI) are also important weapons in this battle. Leveraging emerging technologies, such as behavioral biometrics, will help to reduce the burden on end-users and increase the validity of identity proofing. Organizations can learn a lot about how people interact with their networks, to give a full picture of how things are evolving, but these technology develop-

ments are a bit of a cat-and-mouse game.

Blockchain makes security cheaper and more accessible

M

any organizations have isolated and centralized identity management systems, but the current landscape demands federation and single sign-on (SSO). These systems make identity management, protection and verification very cumbersome, costly and risky for industry enterprises and government agencies. Blockchain has the potential to introduce improvements that can make security more accessible and budget friendly. With smart contract capabilities, there can even be a secondary market where users benefit from sharing resources back to the network. Smart contracts automatically execute pieces of

●● Highlights ●● The global access management market is projected to increase from $5.4 billion in 2016 to $9.6 billion in 2021. ●● Companies with 5,000 or more employees are projected to contribute the largest revenue growth to the access management market over the next five years. ●● Over the past year, there has been growth in non-traditional market sectors such as manufacturing and retail. SecurityLink India ■ April 2018

code carrying valuable data or performing other condition-based executions. A permissioned blockchain technology provides core capabilities that enable a trusted digital identity network to build and operate the following: ●● A shared, append-only ledger, with one version of the facts shared across all permissioned network participants in real time. ●● Smart contracts that ensure verifiable and signed business logic is executed in each transaction. ●● Trust between known participants, to verify transactions and ensure records are valid. ●● Privacy and security measures that grant access only to permissioned parties.

Cybersecurity – Access Management Report 2018

T

his two-volume report provides coverage in several key areas of the identity and access management market, including access management and identity governance and administration. It provides detailed analysis of individual vertical markets from market-specific operating models to key trends and development opportunities. 59


feature

Top 7 Reasons for using A Multi-Tier Storage Solution for Surveillance Content 1. Lower storage spend

O

rganizations are keeping as much as 40% of their inactive data on their most expensive infrastructure. With unstructured video growing exponentially, fueled by the rise of new video surveillance programs, one can’t afford to have this kind of inefficiency. The solution is to adopt a multi-tier storage system that automatically migrates the video to the most cost efficient tiers of storage. Whether that’s high-performance disk storage, object-based storage or high-capacity primary storage, file-based tape or the cloud – the organization can cost-effectively store data based on various policy requirements.

3. High performance

2. Easy, immediate access

S

F

inding a file in the system should be no more difficult than finding a document on a C: drive. Quantum’s solution for video surveillance is a single file system, built specifically for video applications. On the backend, retention and access policies can be set to handle data migration and simplify organization and file recall.

torage performance that performs inefficiently prevents companies from capturing usable data. Quantum's StorNext software retains data cost-effectively, supports complex video management systems and analytic applications, and ingests video from 4 times as many cameras per server to deliver time-to-decision results, allowing proactive protection and crime prevention. Quantum’s storage infrastructure not only handles this sheer volume of data with ease, but also delivers streaming performance regardless of whether it’s on disk, tape, or in the cloud.

4. Scale with storage needs

T

he ability to seamlessly integrate more sources of information into modern analytical tools is becoming more important, as is the capacity to scale and accommodate increased camera and sensor counts, panoramic coverage and higher image resolution. As more cameras are added, image resolutions increase and retention times become longer, Quantum’s solution can scale to handle the need for more capacity.

5. Compliant with current infrastructure

Q

uantum's storage solutions support all major platforms, operating systems and networks, and integrate seamlessly with VMS and other systems. This enables security professionals to integrate the solution into their existing infrastructure without being locked into a

60

SecurityLink India ■ April 2018


feature

single vendor or platform as well as to configure the file interface to receive input from a variety of devices and systems.

6. No trade-off necessary

T

o gain more insight and an increased return on investment from video surveillance data, a storage solution must balance high performance, high capacity and high retention. These three parameters can be flexed to provide the best trade-off between budget and mission whilst minimizing sacrifice of redundancy, accessibility or scalability.

7. Gateway storage architecture

U

pgrading storage capabilities while also satisfying budgetary restrictions is a challenging part of building

a comprehensive storage infrastructure. Instead of replacing the pre-existing storage system, why not build onto it? Artico™ offers an easy, nondisruptive choice for adding Quantum tape, FlexTier™, and Lattus™ scale-out storage to an existing security environment. Quantum’s StorNext platform is a policy-driven tiering software, allowing users to extend primary storage with scalable, more cost-effective tiers of storage. Our multi-tier solution is ideal for security and surveillance organizations with large amounts of video dealing with the challenges that come with scaling storage with your data growth. End users can set up policies to automatically migrate data across tiers, utilizing less costly types of storages like file-based tape and cloud, thus delivering the total capacity needed more cost effectively.

Accomplished New Milestone 10 Million HDCVI Recorders Sold Overseas 1

5 January 2018 made a remarkable day of extraordinary significance for Dahua when they achieved a new milestone by making the sale of 10,000,000th HDCVI recorder in the overseas market – they shipped their 10 millionth XVR (DHI-XVR5108HS-4KL) to Poland. The number demonstrates huge popularity of HDCVI technology which reflects Dahua’s continuous dedication to technology advancement to deliver exceptional value meeting customers’ needs in security surveillance. Despite the overall trend of migrating from analog to IP, Dahua HDCVI recorded 30% growth in 2017 and Dahua HDCVI recorder has been installed in more than 150 countries in 6 continents. HDCVI is a revolutionary technology that has initiated a new era of 720P/ 1080P HD monitoring for the industry. It provides a high-resolution surveillance solution alternative to IP video, with added benefit of simplicity and immunity to cyber-attack. Over the next five years, Dahua upgraded it into HDCVI 4.0, which boasts several major technological breakthroughs in terms of higher resolution, more efficient encoder, power over cable, smartness and compatibility. Notably, Power over Coax (PoC) transmits both video and electrical power over a single coaxial cable, which eliminates separate camera power supplies and further simplifies system deployment with true plug & play, benefiting Dahua customers and end users. HDCVI recorder has also been developed to support five types of cameras namely HDCVI/ AHD/ TVI/ CVBS/ IP. Resolution has evolved from HD to QHD/ UHD thanks to HDCVI-4M/ 4K technology. The required storage space has realized a 70% reduction due to encoding technology advancement from H.264 to H.264+.HDCVI recorder becomes increasingly popular globally. It is used in various crucial projects/ places, including banking system in India and Enso Hotel in Indonesia. 2018 will also see an era of H.265 when a series of H.265 powered products will be released delivering a maximum bandwidth compression up to 90%. Moreover, with more advanced artificial intelligence powered by deep learning algorithms, HDCVI-AI recorder will be able to enable a series of intelligent statistical analysis of video contents. SecurityLink India ■ April 2018

61


International Updates

Boys & Very Young Children at Greater Risk of

Severe Online Sexual Abuse (Study Finds)

A

study of photos and videos in INTERPOL’s International Child Sexual Exploitation (ICSE) database has found the younger the victim, the more severe the abuse was likely to be. A report published today by INTERPOL and ECPAT International also highlights the urgent need for better understanding of online exploitation and for more resources to be allocated towards victim identification. Information on more than one million media files of child sexual exploitation and abuse material from around the world and stored in the ICSE database was analyzed as part of the ground-breaking research. A detailed examination was conducted of a random selection of 800

series of videos and images. Of these, 84 per cent contained explicit sexual activity, assault, gross assault, sadism or other ‘problematic paraphilias’ such as bestiality, humiliation or necrophilia.

Infant victims

M

ore than 60 per cent of unidentified victims were prepubescent, including infants and toddlers. They were also more likely to be subjected to abuse and exploitation featuring an additional paraphilic theme. A link between gender and level of abuse was also identified, with severe abuse images more likely to feature boys. “Unfortunately most people do not realize that when we talk about

child abuse, we are also speaking about very young children, babies who are just months old, being the victims of extreme sexual assault,” said Bjorn Sellstrom, INTERPOL’s Crimes Against Children (CAC) unit coordinator, “Victim identification is at the core of INTERPOL’s work in connecting global investigations into online child sexual abuse. “This report underlines the need for more countries to connect to the ICSE database and become part of this important network of investigators dedicated to rescuing child abuse victims,” added Mr Sellstrom, “This study will help raise awareness of the challenges facing law enforcement and encourage stronger support in developing victim identification efforts globally,”

Other messages from the study ●● Law enforcement officials face multiple challenges in identifying victims and offenders, even with powerful tools such as the ICSE database. ●● A significant proportion (61%) of analyzed series contained images and videos which were both abusive and exploitative. In the vast majority of the analyzed series from child modelling sites, both abusive and exploitative material was visible. ●● Accurate determination of core characteristics of victims such as their age is a challenge, particularly across ethnic groups. ●● Even though most offenders were men, women were also involved in the abuse and exploitation of children where it is clear their role is complicated. ●● The phenomenon of ‘youth-produced sexual imagery’ appears to present a challenge to international law enforcement. This is both in terms of the detection and integration of these type of images into databases, and the identification and classification of its victims. 62

SecurityLink India ■ April 2018


International Updates

Identifying offenders

Registration Open for Global Security Exchange

E

xperts agree that the vast majority of online child sexual abuse material is made by those in the victim’s circle of trust. Identifying the victim is a priority, as well as providing an opportunity to remove the child from harm. It is often the first step in identifying the offender. “While millions of videos and images of children being sexually abused or exploited are uploaded every day, the vast majority of both victims and offenders remain unidentified,” said Dorothy Rozga, Executive Director of ECPAT International. “This study addresses a pressing need to address the lack of research and indicators on unidentified children depicted in this kind of material, as well as the quality of the response by law enforcement around the world. “What is needed now is a coordinated global action. Almost all countries in the world have committed to ending the sexual exploitation of children but you can’t end what you can’t measure,” said Ms Rozga. To date more than 12,000 victims of child sexual abuse around the world have been identified via the ICSE database.

Towards a global indicator on unidentified victims in child sexual exploitation material represents unique cooperation between INTERPOL and ECPAT International. It is a key component of a larger programme called the ICSE Database Connectivity and Awareness Raising Enhancements (ICARE) Project, co-funded by the Internal Security Fund of the European Union and carried out between 2016 and 2018.

Powered by ASIS International, the industry’s flagship event will deliver diversified programming, experiential learning, and handson access to the newest technology solutions on the market

A

SIS International, the leading association for security professionals worldwide, has opened registration for the industry’s flagship event, the Global Security Exchange (GSX), taking place Sept. 23-27 in Las Vegas, Nevada. Formerly known as the ASIS Annual Seminar and Exhibits, GSX will deliver the year’s most comprehensive security event, packed with peer networking, innovative technologies, and expert-led instruction that hones in on both day-to-day challenges and the emerging risks and threats facing security professionals across the globe. “This is not your typical security conference,” remarked Peter J. O’Neil, CEO, ASIS International, “GSX will elevate the traditional event experience with modernized, immersive education, exceptional networking opportunities, and an expo floor that will be transformed into a learning lab environment.” The five-day event opens the door to the entire industry such as cyber and operational security professionals from all verticals across the private and public sector, allied organizations and partners, and the industry’s leading service and solution providers. The conference program will feature globally recognized thought leaders and discussions on hot topics across nearly two dozen tracks. The learning formats range from deep dives to small-group programs, ensuring attendees at all career stages can gain valuable peer insights and information that can be immediately implemented. ASIS International 2018 President Richard E. Chase, CPP, PCI, PSP notes, “The challenges facing security professionals continue to increase exponentially. Attending GSX is the best way to stay ahead of the rapidly evolving security landscape.” More than 500 exhibiting companies will be showcasing breakthrough innovations and exciting new products and services that are revolutionizing the security space. Early bird savings are available until June 30. ASIS members enjoy free access to the expo floor and receive significant savings on their conference registration. SecurityLink India ■ April 2018

63


International Updates

IFSEC 2018 The Future of Security Seminar Theatre Powered by Tavcom Training

I

f one is an installer and increasingly anxious about the future direction of security systems and technology, don’t panic – IFSEC 2018 has the answers. In partnership with at Tavcom Training, the leading provider of accredited security systems training courses, the future of security seminar theatre, sponsored by Panasonic UK, and within the IFSEC exhibition, will deliver a range of essential CPD accredited presentations on the very latest in security technology design and integration. Physical security systems are now heavily dependent on IT-based platforms and this intersection of technologies has opened up significant potential for security installers and engineers to offer even better solutions for their customers. To reflect this demand, The Future Of Security Theatre will focus on these opportunities offering a full set of free seminars, designed with IFSEC installers in mind. The sessions will expertly target key areas addressing cyber security, IT best practice, practical IP networking, integration and system design plus a wide range of additional core areas, delivered by specialist Tavcom trainers. Delivering insight into the major security challenges, the cyber security sections will look into how robust approaches to cyber security can strengthen an existing physical security system, providing the end user with even greater resilience to cyber threats. From an IT security aspect, the sessions will include understanding firewalls and identifying 64

vulnerabilities which can be inherent in the installation process. In addition, there will be exclusive sessions on the use of UAVs and drones in security, and how this technology is both a benefit and a hazard. The Future of Security Theatre will be a major element in the new ‘Show Me How’ project at IFSEC 2018, which will identify education opportunities and exhibiting companies as key destinations where visitors can go to learn about best practice and capabilities. Exhibitors will host technical experts on their stands to ensure visitors gain a direct understanding of the products and solutions – making sure they leave fully equipped with the right knowledge. All ‘Show Me How’ areas and exhibitors will be clearly signposted to help visitors make the best possible use of their time at IFSEC 2018. With cybercrime being an ever present threat, which exploits business weaknesses around storing data in multiple locations, Panasonic Business, as a recognised CCTV manufacturer, is proactively taking action towards these threats, by expanding its cyber offerings, which it intends to showcase at IFSEC 2018. In particular, it will focus on how integrators and installers can bring additional value to end users by providing cyber safe environments. Paul Tennent, Sales Director at Tavcom Training states, “As a leading training provider for the security and fire installer sectors, Tavcom is excited to be SecurityLink India ■ April 2018

part of the new position IFSEC is taking as a major education opportunity. It’s been interesting to see the insights and research IFSEC has gained over the past year, particularly in regard to the expectations and direct needs of the installer community. It’s also acutely apparent that growth areas and technologies in and around cyber security are becoming critical, so we’re happy to lend our expertise to the wider IFSEC audience.’’ Gerry Dunphy, Brand Director for IFSEC states, “We’ve been through an extensive research programme over the past twelve months, which has provided IFSEC with a clear set of directions, matching the direct needs of our customers. They’ve told us they have a need to understand the future, they need guidance on areas such as how cyber security impacts on physical systems and they need to hear from specialists they can trust. Working with Tavcom Training on The Future Of Security Theatre is the perfect solution given Tavcom’s history and expertise in these core areas. Our customers have told us what’s keeping them awake at night and it’s IFSEC’s duty to help them rest more comfortably.” IFSEC International takes place at London’s ExCeL from 19 to 21 June 2018. It’s co-located with FIREX International, Safety & Health Expo and Facilities Show – a strategic blend of related business to business events, focusing on the protection and management of people, property and assets.


International Updates

CAME Wins the Brand Identity GrandPrix Awarded with the main recognition, the Italian company beats major local and international groups. The CAME Group also wins best Corporate Identity – the synthesis of the skills and knowledge of each of the companies in the Group and their ability to create innovative products, improving people’s lives and the service quality offered by professional installers

C

AME, the leading Italian Group providing integrated technology for automating residential, public and urban spaces, has beaten 13 major Italian and international companies achieving overall first prize ‘GrandPrix’ and first prize for the best Corporate Identity at the 23rd ‘Brand Identity GrandPrix,’ the most important brand identity event in Italy. Selected among 14 category winners, CAME was also awarded with the overall first prize ‘Grand Prix for the Best Brand Identity.’ On stage to collect the awards was Andrea Menuzzo, CEO of CAME, alongside Gaetano Grizzanti, Founder of Univisual, the company which worked with CAME to develop its new award winning brand identity. With almost 1,500 collaborators and a recorded turnover of €255 million in 2016, CAME is an ambassador for ‘Made in Italy’ around the world, recognised internationally for having designed and managed the access-control system at Expo Milano 2015 and the Universal Exposition in Astana. The company is also widely recognised in the market for having designed the first gate operators, and having laid the foundations for today’s modern technology used to manage home security and control systems. These awards pay homage to CAME’s rebranding journey which, in 2017, united the company’s entire service offering under one single brand; and with that came a new market positioning to represent the integration of these diverse yet mutually complementary companies, acquired over

recent years. Thanks to a project vision of technology being increasingly connected and integrated into our daily lives, and a multicultural approach that focuses on the needs of people around the world, CAME has successfully capitalised on the skills and experience of the important Italian and international companies that make up the Group including BPT, Go, Urbaco and Parkare, developing smart products that can communicate with one another. “We are proud to have received these prestigious awards for our corporate identity, which represents a position that sees technology as the key to accessing a new quality of life,” said Andrea Menuzzo, CAME’s CEO, “This new brand is an important step on the evolutionary journey the Group has undertaken, starting with operators, video-entry systems, security and home automation, and running right through to complex integrated systems. Our new identity is the result of a repositioning strategy that will allow us to take on the international competition, as a technology partner adept at develop-

 The prestigious awards,

collected by CEO Andrea Menuzzo, are a symbol of the Group’s growth as a market leader in the operators and security sector, known around the world for the accesscontrol system it implemented at the Universal Exposition events in Milan and Astana  SecurityLink India ■ April 2018

ing ever more innovative, connected and easy-to-install technology.” The new brand and corporate identity, designed with Milanese company Univisual to support the Group’s growth, communicate the value CAME places on people and its ability to create customised projects that respond to the needs of each different market. The products created by CAME represent a business model that has people and their wellbeing at the heart of strategic planning, helping them automate residential, public and urban spaces and make them ‘smart.’ This is thanks to integrated technology, capable of guaranteeing comfort, security and excellent performance. Intense research and development work, encompassing over 60 years of experience and investment in the home and building automation sector, makes the company a technology partner able to support professionals in their everyday work. 65


International Updates

Industrial Camera Wins iF Design Award 2018 D

ahua Technology has been honored once again as the recipient of iF Design Award, this time for its industrial camera – ‘Eye in the Sky Robot.’ iF Design Award is among the most prestigious and largest design competitions in the world. Since 1953, designers, manufacturers and users have looked to iF as a sign of good design. With 6,402 entries from 54 countries, iF Design Award has seen a record number of submissions this year. Never before have so many products and designs been entered into the competition. The members of the jury faced a difficult task.

After 3-day long examination and deliberation by a panel of 63 international jurors who are experts in design, industry and architecture, Dahua ‘Eye in the Sky Robot’ industrial camera, stood out as the winner. What distinguished Dahua industrial camera is the advantage in innovation and product design, resulting from graphic processing technologies as well as designing experience accumulated from more than a decade time. This product demonstrated the core competency of Dahua R&D center and institutes of advanced technologies in ISP software, algorithm, hardware, structure, ALT testing etc. For Dahua, it is not the first time being recognized by internationally renowned design award. In 2014, Dahua HD Sync Auto Focus Camera also won an iF Product Design Award. The same year also saw Dahua full HD TV Box recognized by iF Product Design Award as well as Red Dot Award. Dahua NKB5000 ultra-high definition (UHD) decoding network keyboard won both iF Design Award 2017 and Red Dot Award 2017, the latter of which was also given to Dahua full coverage positioning PTZ camera. 66

INTERPOL Memorial Honours the Fallen

I

NTERPOL has unveiled a memorial to commemorate the service and sacrifice of law enforcement officers who have lost their lives in the line of duty across its 192 member countries. The memorial to fallen police officers worldwide comprises two commemorative stone plaques – one at the INTERPOL General Secretariat in Lyon, France, and the other at the INTERPOL Global Complex for Innovation (IGCI) in Singapore. Separate ceremonies were held at the unveiling of each plaque to pay tribute to the men and women who lost their lives. Speaking at a ceremony at the General Secretariat, INTERPOL President Meng Hongwei said, “Police officers face extremely high risks in safeguarding global security and law and order. Every day, in different parts of the world, police officers lose their precious lives whilst serving and protecting the citizens of their country.” “As the world’s largest police organization, INTERPOL has the responsibility to permanently honour their sacrifice. They are all heroes.” The memorial represents a permanent reminder that serving the cause of law enforcement is a dangerous occupation undertaken by dedicated men and women worldwide. Unveiling the plaque at the IGCI in Singapore, INTERPOL Secretary General Jürgen Stock said, “Protecting communities from crime is a unifying force across borders, languages and cultures, which comes at a heavy price for thousands of police officers every year who are either killed or injured.” “For police colleagues the reward comes in defending our societies, and knowing that their actions will resonate with future generations. The memorial conveys a positive message of courage in the face of danger, and hope in the face of suffering.” The INTERPOL memorial will provide a place for police worldwide to commemorate the loss of their colleagues and preserve their memory. It will also serve to raise awareness about the dangers faced by police officers worldwide who have put public service above their own safety.

SecurityLink India ■ April 2018


International Updates

Wins Company H of the Year At the PLC Awards

H

alma has been named ‘Company of the Year’ at this year’s PLC Awards held at the Grosvenor House Hotel on 15 March. The coveted Company of the Year award recognises and rewards the main market company that has clearly demonstrated that success is not just a shortterm phenomenon. They will be “a soundly financed, growth business with a long-term vision and commitment to sustainability.” The award, presented by Richard Crawley, Co-Head of Investment Banking, at Liberum (sponsor) and Reeta Chakrabarti (awards presenter), was accepted by Kevin Thompson, Halma’s Finance Director, Carole Cran, Nonexecutive Director, and Marc Ronchetti, Group Financial Controller. Kevin Thompson said, “We are honoured to have been recognised by the prestigious PLC Awards as 2017 ‘Company of the Year.’ As a global group of life-saving technology companies, the credit goes to the teams across Halma helping us to grow a safer, cleaner, healthier future for everyone, every day.” The PLC Awards are aimed at all quoted companies listed on the main market. The success of the awards has led to it being broadened out to include FTSE 100 companies as well as the FTSE 250, FTSE Small Cap and Fledgling indices.

Appointed CVE Numbering Authority

ikvision has recently been designated as the Common Vulnerability and Exposures (CVE) Numbering Authority (CNA) that enables the hi-tech security solutions provider to assign CVE identifiers for flaws reported. With the appointment, Hikvision can assign CVE identifiers to vulnerabilities found in its own products and firmware, regardless of whether the issues have been disclosed by Hikvision employees or third-party experts. CNAs World Map as of February 2018 This is the first step towards vulnerabilities disclosure, verification and solutions release. The appointment will help speed up the problem-solving process for potential security risks. The announcement is a vote of confidence to Hikvision from within the industry, which indicates that the company has gained international recognition not only for the way it handles vulnerabilities and exposures efficiently and effectively, but also for its attitude of being transparent and accountable at all times. “We are honoured to become a CNA and will keep collaborating with MITRE, to deal with potential security vulnerabilities in a timely and efficient manner,” said Bin Wang, Chief Officer at Hikvision Network and Information Security Laboratory and Network Security Department, “The CNA appointment will help iron out the creases in the information exchanges between security researchers and security solution providers. This will result in end users enjoying meaningful security issues.” “Our support of the cyber security vulnerabilities disclosure practices is driven by our deep-seated commitment to supporting and empowering the commercial and civil communities,” said Daniel Huang, Hikvision Oceania Managing Director, “Our goal is two-fold – first to help improve and mature the security practices based on Hikvision solutions provided over the years, and finally to continually keep end-users in the loop so that they can stay informed of the potential risks and have timely solutions to solve those issues.” CNAs are organisations from around the world that are authorised to assign CVE entries to vulnerabilities affecting products within their distinct, agreed-upon scope, for inclusion in first-time public announcements of new vulnerabilities. CNAs are the main method for requesting a CVE ID. Apart from Hikvision, there are 80+ organizations currently participating as CNAs. The list includes Facebook, Google, Apple, IBM, Intel, Airbus, Alibaba, Microsoft, Adobe, BlackBerry, Cisco, Netflix, Oracle, Rapid 7, Schneider Electric, Siemens, HP, CERT/ CC, Check Point, Debian GNU/ Linux, Dell EMC, HackerOne, ICS-CERT, OpenSSL and MITRE (primary CNA). SecurityLink India ■ April 2018

67


International Updates

Foundation Report

Hosts Grand Annual R&R Event in Bangkok

C

P PLUS has recently hosted a grand Rewards & Recognition event in Bangkok to recognize and reward efforts and contributions made by the team in business. The event marked its completion of a year since its touch down in Indonesia a year back. Hosted at the Hotel Raman Garden in Bangkok on the 9th of March 2018, the event saw the felicitation of 20 partners who clocked the greatest contribution in the year’s business. They were awarded with a trip to the Maldives each – with the one topping the list taking home a chain in 22k gold.

 I’d like to thank each and every partner in Indonesia for their contribution over the past year. It was an action filled year with a great performance from the Indonesia team here. The top 20 performers of the year have been felicitated. We hope to see such great performances and even better for many more years to come  – Aditya Khemka MD, CP PLUS The event was commenced with a corporate presentation followed by the latest technologies and products from CP PLUS, succeeded by the felicitation ceremony, an elaborate

lunch and Hi-Tea. It was finally concluded with a demo of CP PLUS’ product range, including IP, Analog, T&A, Body Worn, VDP and MDVR, and a networking session. 68

Addressing Archaeological Site Security New research addresses need for security practitioners to assist in efforts to preserve historical sites

T

he ASIS Foundation, the charitable research and education arm of ASIS International, has published applied research that assesses and provides recommendations for the security of historically important archaeological sites. Compiled by the ASIS International Cultural Properties Council, the report was made possible through a grant from the ASIS Foundation. ASIS International is the leading association for security management professionals worldwide. The research, which evaluates the security of Clunia, an ancient Roman city on the Iberian Peninsula, includes a detailed site survey undertaken by James H. Clark, CPP, and Ricardo Sanz Marcos under the advise of 2017 Cultural Properties Council chair Robert Carotenuto, CPP, PCI, PSP. Clark and Marcos identified conditions – such as weather, looting, and careless behavior – that could create security vulnerabilities for the site and its resources. The research team believes that the recommendations they draw from this survey are applicable at other archaeological sites. “Most of the completed research on cultural site security focuses on how to protect them during times of war,” says Carotenuto, “These historical treasures are threatened during peace time as well. Our report demonstrates to the security community that you can apply common physical security techniques to protect any site.” The Clunia report is the latest in the ASIS Foundation’s series of connecting research in security to practice (CRISP) reports – providing practical, researched-based solutions to help security professionals effectively tackle a wide range of security issues. Previous CRISP reports address issues of insider threat, supply chain security, sports team travel security, and more.

SecurityLink India ■ April 2018


International Updates

Enhancing the Impact of in-Store Music Axis partners with leading content providers

W

hile in-store audio is wellestablished, the potential for music and audio in enhancing the retail customer experience and driving sales is still largely untapped. In announcing a number of strategic partnerships, Axis network audio technologies now integrate with several subscription-based music services to enable tailored background music for business in primarily retail establishments. By partnering with these music services, Axis can now offer a complete solution for retailers who wish to easily manage all aspects of their in-store audio. By partnering with leading music services, Axis can now offer a complete solution for customers who wish to easily manage all aspects of their in-store audio. Background music for business has a significant impact on the behavior of customers in-store. A study by one of the new Axis partners, Sound-track Your Brand, found that in a restaurant environment, playing background music that reflects your brand’s identity can boost sales by an average of 9.1% compared to music which doesn’t. The existing Axis network audio technology provides a host of use cases, including targeted public address functionality and integration with video analytics. By partnering with providers of customizable background music, Axis can now offer a complete suite of easilymanaged, in-store audio solutions.

Axis announces partnerships with Sound-track Your Brand, Royal Streaming, MUSIC2BIZ and Pinesker Media Company. “Traditionally, in-store audio has been used for functional staff and customer announcements, or generic background music,” commented Håkan Hansson, Global Product Manager Audio, Axis Communications, “However, research shows that tailored music, combined with strategic announcements, can actively help move customers towards a sale. When combined with Axis network audio devices, the partnerships we have announced today will allow retailers to deliver tailored audio consistently across their store network, supporting core brand values and enhancing the customer experience, with the high reliability associated SecurityLink India ■ April 2018

with a 100% digital system.” These music services for business can be fully integrated with existing Axis network speaker systems without any additional hardware or software, allowing for the seamless integration of scheduled and ad hoc announcements with tailored music. They can also work with non-Axis audio systems through AXIS C8033 network audio bridge, enabling the connection of both analog and digital audio systems. Axis network speakers integrated with music services allow HQ central control to ensure the right music is being played at each one of their branches. Axis audio devices are available through Axis distribution channels, while the music streaming services are available direct from the content providers. 69


International Updates

MOBOTIX Hold Baggage Scanner Meets Achieves Genetec Highest Security Standards in EU Platinum Partner Status

T

he Smiths Detection HI-SCAN 10080 XCT has achieved ECAC approval as a Standard 3.1 explosives detection system for hold baggage – the highest, defined security standard in the EU. This significant advance was made possible by using a dual-view, dual-energy line scanner with high resolution 3D Computed Tomography (CT) to deliver exceptional data. This achievement gives airports currently upgrading to Standard 3 technology, the option to increase detection levels even further to 3.1; and any standard 3 systems already installed can be easily elevated to 3.1 via a software upgrade. The detection algorithms are interchangeable on a bag by bag basis depending on the destination and associated risk level. This offers additional flexibility and productivity. “With the capability to meet detection requirements for both current and emerging threats, the HI-SCAN 10080 XCT is a future proof investment, which offers high levels of security and operational efficiency,” commented Matt Clark, VP Technology and Product Development, Smiths Detection, “We are helping airports across Europe to make the transition to Standard 3 and are delighted to now also offer the more stringent Standard 3.1 approved technology.” The belt speed is an impressive 0.5m/sec, enabling the HI-SCAN 10080 XCT to handle up to 1800 bags per hour and hence making the screening process faster and more efficient. A large rectangular tunnel (107x81cm), extremely high quality, full colour images and a low false alarm rate all also support the challenging performance levels demanded by airports. In addition to Standard 3.1 approval, the HI-SCAN 10080 XCT has been laboratory certified by the US Transportation Security Administration (TSA) as meeting current regulatory requirements for hold baggage. 70

SecurityLink India ■ April 2018

With a shared open-architecture strategy, both companies offer technical benefits to growing customer base

M

OBOTIX has been named as a Platinum Partner by Genetec Inc. The award of Platinum Partner status, which is held by only eight Genetec technology partners globally, is a recognition of the strategic nature of the relationship that includes research and development, testing, business development, and sales support for new and existing enterprise clients worldwide. As part of the relationship, the MOBOTIX Mx6 series of outdoor, indoor and thermal cameras is now officially supported in current and future versions of the Genetec™ Security Center. The integration includes extensive support of the MOBOTIX MxPEG codec along with key features including intelligent video analysis tools and behavioural detection. Security Center blends IP security systems within a single intuitive platform to offer users a comprehensive view of their security and operations. From access control, video surveillance, and automatic license plate recognition to communications, intrusion detection, and analytics, Security Center empowers organisations to make informed decisions through enhanced situational


International Updates

awareness, unified command and control, and connectivity to the cloud. The capabilities offered by Genetec Security Center provides a perfect fit for the innovative MOBOTIX high-resolution and network-based video security systems that offers hardware reliability, decentralized architecture and energy efficiency. “Over the last 18 months since announcing our initial partnership, teams from MOBOTIX and Genetec and our respective partner communities have closed several significant customer wins and worked together to ensure that our technologies are seamlessly integrated,” said Thomas Dieregsweiler, Head of Product Management of MOBOTIX, “Moving forward, we plan to extend our relationship to work more closely on more large scale opportunities that deliver significant operational and cost benefits to joint customers.” Genetec and MOBOTIX will continue to introduce and share their respective strengths into new and existing markets, helping both mid-size and larger scale, multi-site clients realise their respective security projects built on an open-architecture platform. “MOBOTIX has undergone a period of change in which it has opened up its technology and integration process to welcome partnerships with other industry leaders like Genetec,” said Georges Tannous, Strategic Alliances Director for Genetec, “The designation of Platinum Partner status underscores our commitment to helping both our customers and shared partner ecosystem to benefit from closer integration and we look forward to working with MOBOTIX on a number of exciting go-to-market initiatives later in the year.”

Platforms for Product Leadership Common global technology platforms are helping ASSA ABLOY continuously bring the best products to market all over the world

A

SSA ABLOY believes that product leadership, with the constant flow of innovative new products and services to the market, is the single most important source of organic growth. This is especially true in the connected society where competition in the Internet of Things (IoT) is fierce. Shared Technologies is a central ASSA ABLOY function responsible for the development of common group platforms and interfaces. “Some products need to be local, because there are different regulations and standards in different parts of the world,” says Åsa, “But when it comes to software, we can do that on a global basis, so we try to get synergies on the technology level and then we diversify the products.”

 Product leadership means being the best when it comes to solutions – doing something that no one else has done before or in a way that no one else has done before, and if you want to be in the lead you have to be the first  – Åsa Christiander Director Product Management, Shared Technologies There are six global platforms currently available or in development by Shared Technologies. Some, like the recently developed Accentra, a cloud-based access control system, is more or less as an end product, with simple variants in color scheme or language available for the different markets. Other platforms, like CLIQ, an electronic cylinder technology first developed 15 years ago, are more like back-end technologies that can be used by different divisions and companies within the group for many different products. Many of the newer global platforms being developed are targeted at the area of inter-connectivity and information such as Connected Homes and Information Services, which is basically the Internet of Things but for ASSA ABLOY’s universe. They include products that can remotely control who is coming into people’s houses. Creating global platforms helps share the burden of development across the divisions. It makes development cheaper, and also in many cases, faster, especially when it comes to adding new solutions onto the platform. “Without a platform you would have to run the whole race all over again when you come up with a new idea,” says Åsa, “And the world is moving faster. So in regards to product leadership, if you want to be first, then you have to be fast.” SecurityLink India ■ April 2018

71


International Updates

IdenTrust Becomes the #1 Digital Certification Authority ID Global® IdenTrust® business is the #1 digital certification authority in the world, according to the latest independent research results from W3Techs, a technology survey company that consistently tracks the SSL certificate market. IdenTrust’s leap to being the market leader for digital certificates signifies only the second time in the history of the Internet that the top position for the certification authority has changed – first in 2015 by a competitor and now to IdenTrust after a fast-paced growth trajectory over the past two years. The W3Techs quantitative research revealed a few facts such as IdenTrust is now used by 17.5% of all websites, globally; IdenTrust is also the number one SSL certificate authority overall in most European countries; Nearly 23% of all new sites use IdenTrust digital certificates; and IdenTrust has issued more than 36.4% of all SSL certificates worldwide. “Becoming the #1 certification authority for SSL certificates makes HID’s IdenTrust among the most trusted digital certificate providers in the world,” said Brad Jarvis, Vice President and Managing Director, IAM Solutions with HID Global, “Third parties trust our digital certificates because they are reliable, easy to integrate and compliant with standards. Our customers trust us to provide digital certificate services from a secure and scalable platform capable of meeting the needs of their dynamic business environments.” This achievement reflects the changing landscape of SSL certificate usage, with more emphasis on automated processes and the value of the IdenTrust infrastructure and broader partner network associated with HID Global. One aspect of the changing landscape is how tens of thousands of websites are reportedly going to find themselves labelled as ‘unsafe’ next

H

month, due to a decision in September 2017 by Google to cease trusting certificates from a former market leader. IdenTrust digital certificates support real-time validation of Internet traffic on a scalable, software-as-a-service platform. IdenTrust helps create a trusted environment that secures business and life-critical data. When IdenTrust digital certificates are combined with HID’s identity and access management platform, the company is able to scale to the requirements of the industry’s most challenging environments such as certificate-based authentication for complex enterprise data protection and for the protection of billions of connections. “IdenTrust’s ascension to the top spot also affirms the confidence that the market has in the vendor with the widest range of authentication solutions in the industry – none other than HID Global,” added Jarvis, “Our IAM products are marked by resilience and enhanced security features.” IdenTrust digital certificates are particularly relevant for surveillance (cameras, access), transportation (air, cars and trains), healthcare and financial services. The rapid expansion of mobile is also driving the increased adoption of digital certificates. HID’s IdenTrust digital certificates are widely recognized by government agencies, global financial institutions and corporations around the world. IdenTrust products enable organizations to effectively manage the risks associated with identity authentication, work interoperably with countries around the world, minimize investment in creating their own policies and legal frameworks, and ensure trust in the identity of a person or thing.

Completes Acquisition of

M

otorola Solutions, Inc. has completed the previously announced acquisition of all issued and outstanding common shares of Avigilon. Motorola Solutions through its wholly owned subsidiary, Motorola Solutions Canada Holdings Inc., acquired 44,617,813 Avigilon shares for cash consideration of CAD$27.00 per share. This, together with net debt, represents a total enterprise value of approximately US$ 1.0 billion. The Avigilon shares are expected to be delisted from the Toronto Stock Exchange effective as of the close of trading on or about April 2, 2018, and Avigilon will apply to cease to be a reporting issuer in all provinces of Canada. 72

SecurityLink India ■ April 2018


International Updates

MIPS 2018 Highlighting Artificial Intelligence as next market disruption for video technology More than 1,500 attendees gathered together at Milestone Systems’ annual community events in Hanoi, Barcelona and Las Vegas exploring how to create an intelligent world with video technology

M

ilestone Systems, the open platform company in networked video management software (VMS), concluded a series of regional partner and customers events for 2018 with the recently held MIPS (Milestone Integration Platform Symposium) in Las Vegas. The three events gathered 1,509 attendees and 90 exhibitors, and the theme was how artificial intelligence (AI) will be the next market disruption for video technology. Milestone Systems also took the opportunity to award partners for their contributions to the community over the past year. MIPS 2018 celebrated its 13th anniversary, and the 2018 events were the second time for the events to be held in APAC, EMEA and the Americas. Milestone Systems’ top management presented products and platform initiatives for 2018, including the technology game-changers they see impacting the

industry. The importance of co-creation with the partner community was highlighted as a key enabler for success.

Artificial Intelligence will disrupt our industry

W

ith every device being a sensor, and technologies connecting them in new ways, the amount of data keeps growing. This requires more efficient ways to translate data into intelligence for taking faster decisions both for making the world a safer place, and for moving beyond security into many improvements for video business systems. On stage at MIPS Americas, Tanmay Bakshi, Algorithmist, Author, Watson

SecurityLink India ■ April 2018

& Cognitive Developer at IBM, spoke about how AI equals IA (Artificial Intelligence = Intelligence Augmented), where the technology actually helps humans become more intelligent by supplementing human analysis, planning and decision-making. “AI will amplify human beings to new heights,” said Bakshi. A number of other prominent speakers in Hanoi, Barcelona and Las Vegas shared their views on intelligent video systems that can support people and organizations in making sense of the rapidly increasing influx of data. Presenters included, among others: Louis Richardson, Chief Storyteller, IBM Watson; Dr Shiliang Pu, Director & Chief Expert, HikVision; Monica Wang, Senior Analyst Video Surveillance, IHS Markit; Ben Hammersley, Futurist and Global Digital Leader, Hammersley Futures. 73


International Updates

Calls on Developers for

Advanced Video Streaming Challenge NVIF®, the leading global standardization initiative for IP-based physical security products, has announced the ONVIF Open Source Spotlight Challenge, a technology competition to develop open source applications for innovative IP video streaming applications to help resolve global security issues. The two-month online challenge, offered in conjunction with BeMyApp, offers lucrative cash prizes for developers who use the protocol provided by ONVIF to create open source mobile or desktop applications for advanced video streaming that provides easy and secure authentication from all platforms. Developers will connect to online prototype cameras with Profile T functionality from Axis Communications, Bosch Security and Safety Systems, Dahua Technology, Hikvision and Uniview for the challenge. “As the need for interoperability grows in significance in other industries, it’s more important than ever to seek out innovative physical security solutions to make sure we’re offering that interoperability with the highest levels of efficiency, security and reliability,” said Per Björkdahl, Chairman of the ONVIF Steering Committee, “We’re excited to see what inventive ideas are offered from the greater technology community.” Using a series of video tutorials, participants will learn

O

how to create an application using C# on Windows, iOS on Apple, Java on Android or JavaScript in the browser that connects to an IP camera. Once a developer submits a mobile or desktop app with an innovative security solution, they can earn instant rewards, as well as the opportunity to compete for major cash prizes from a $20,000 prize pool. Judging will be based on innovation, viability of implementation, functionality, and whether the app is easy to navigate and use. The competition is open for participants on March 26 and closes June 3, with winners also announced in late June. Founded in 2008, ONVIF is a leading and well-recognized industry forum driving interoperability for IP-based physical security products. The organization has a global member base of established camera, video management system and access control companies and more than 9,000 Profile conformant products. With Profile S for streaming video; Profile G for recording and storage; Profile C for physical access control; Profile Q for improved out-of-the-box functionality, Profile A for broader access control configuration and the new Profile T Release Candidate for advanced streaming, ONVIF continues to work with its members to expand the number of IP interoperability solutions ONVIF conformant products can provide.

Sparkles at

Asian Brand & Leadership Conclave 2018 C

P PLUS has recently bagged Asia’s Most Admired Brand 2018, Asia’s Most Admired Leader, and Asia’s Most Admired CMO awards at the recently held Asian Brand & Leadership Conclave 2018 in Singapore. The event was conducted to honor Asia’s top 100 most admired brands, leaders, CFOs and CMOs, in what was a convergence of Asia’s greatest brands and extraordinary leaderships. “It is a sheer honor to be receiving this recognition amidst such an elite and affluent audience. We’re truly humbled. The evolution and growth of CP PLUS has been a spiritual journey; a journey of learning, perseverance and building relationships. We’ve come a long way since its inception, from taking an industry that was barely recognized in Asia to propping it up as a necessity like any other basic one. And awards such as these motivate us to do even better,” said Aditya Khemka, MD, CP PLUS. CP PLUS was accredited with Asia’s Most Admired Brand 2018; Aditya Khemka, MD, CP PLUS as Asia’s Most Admired Leader; and Yogesh B. Dutta, CMO, CP PLUS as Asia’s Most Admired CMO. Gracing the event were luminaries from the advertising, marketing and branding world including business professionals, corporate leaders, brand custodians, brand communication heads, VIPs and dignitaries. 100 brands were invited at the event – 35 from India of which CP PLUS was one, and 50 top-notch leaders who’ve made a global impact with their leadership and achieved the distinction of heading these brands through a remarkable journey. 74

SecurityLink India ■ April 2018


International Updates

Identifies Top Trends

Driving IoT in 2018 and Beyond Number of connected IoT devices to top 31 billion in 2018 The IoT is not a recent phenomenon, but what is new is it’s now working hand in hand with other transformative technologies like artificial intelligence and the cloud

D

riven by the need for intelligent connected devices in industrial and commercial applications, the number of connected Internet of Things (IoT) devices globally will grow to more than 31 billion in 2018, according to new analysis from business information provider IHS Markit. The commercial and industrial sector, powered by building automation, industrial automation and lighting, is forecast to account for about half of all new connected devices between 2018 and 2030. “The IoT is not a recent phenomenon, but what is new is it’s now working hand in hand with other transformative technologies like artificial intelligence and the cloud,” said Jenalea Howell, Research Director for IoT connectivity and smart cities at IHS Markit, “This is fueling the convergence of verticals such as industrial IoT, smart cities and buildings, and the connected home, and it’s increasing competitiveness.” In its latest IoT Trend Watch report, IHS Markit identifies four key drivers and the trends that will impact the IoT this year and beyond:

Innovation and competitiveness

T

he IoT opportunity has attracted numerous duplicative and overlapping wireless solutions such as Bluetooth, Wi-Fi, 5G, NB-IoT, LoRa

and Sigfox. Standards consolidation lies ahead, but confusion and fragmentation will dominate in the near term. Enterprises are leveraging the location of data as a competitive advantage, and as a result a hybrid approach to cloud and data center management is taking hold. More and more companies will employ both on-premises data centers and off-premises cloud services to manage their IT infrastructure.

Business models

5

G builds upon earlier investments in M2M (machine-to-machine) and traditional IoT applications, enabling significant increases in economies of scale that drive adoption and utilization across all sectors of industry. Improved low-power requirements, the ability to operate on licensed and unlicensed spectrum, and better coverage will drive significantly lower costs across the IoT. Cellular IoT gateways, which facilitate WAN connectivity, will be integral to edge computing deployments. 2018 will bring increased focus on compute capabilities and enhanced security for cellular IoT gateways.

Standardization and security

C

ybersecurity is a leading concern for IoT adopters. IoT deployments face critical cybersecurity risks SecurityLink India ■ April 2018

because there are potentially many more IoT devices to secure compared to traditional IT infrastructure devices, presenting increased risk to traditional communications and computing systems, as well as physical health and safety. Despite the promise it holds, blockchain – a technology for securely storing and transferring data – is not a panacea. Initially, IoT applications for blockchain technology will focus on asset tracking and management.

Wireless technology innovation

I

oT platforms are becoming more integrated. Currently, there are more than 400 IoT platform providers. Many vendors are using integration to compete more effectively, providing highly integrated functionality for IoT application developers and adopters. Significant innovation will occur when IoT app developers can leverage data from myriad deployed sensors, machines and data stores. A key inflection point for the IoT will be the gradual shift from the current ‘Internet of Things’ deployment model to one where data can be exposed, discovered, entitled and shared with third-party IoT application developers. IHS Markit provides insight and analysis for more than 25 connectivity technologies in 34 application segments used for the IoT. 75


feature

Bosch is Turning the Car into a Lifesaver A

milestone in road safety – effective March 31, 2018, the automatic ‘emergency call’ system – eCall, for short – becomes mandatory in the European Union. This requirement means that a digital first responder who automatically calls for help in an accident will be riding along in the car, each and every time. “Connecting cars makes a great deal possible. Through the automatic eCall system, connected vehicles are now going to become lifesavers as well,” says Dr. Dirk Hoheisel, Member of the Board of Management of Robert Bosch GmbH. All new passenger vehicle models that hit the EU market after March 31, 2018, will come with eCall as standard. These vehicles will feature a standardized eCall box that automatically alerts the local emergency services via the number 112, which is the same across Europe. As a result, lifesaving assistance will be able to arrive with greater speed and precision at the scene of an accident. The EU expects that eCall will save 2,500 lives each year and reduce the number of people who are seriously injured by 15 percent. The first automak-

ers are already providing their customers with the digital lifesaver as part of the navigation system without being required to do so by law. Bosch offers an extensive eCall range featuring telematics solutions and services. Thanks to the telematic eCall plug, even older cars can benefit from the solution. ●● Thanks to the automatic eCall, emergency responders can arrive at the scene of an accident up to twice as fast. ●● eCall service from Bosch speaks 16 languages. ●● The telematics eCall plug is the retrofit eCall solution for all vehicles. ●● Bosch develops eCall for cars and motorcycles.

Rapid assistance as standard

I

n the situations of emergency automatic eCall system springs to action as an indispensable lifesaver. It knows exactly where the accident has occurred – regardless if it happens at night on a deserted road or on the freeway – and

automatically sends that information to the rescue services. “eCall places the emergency call faster than a person could and initiates the lifesaving rescue chain,” Hoheisel says. An SOS button is also installed on the vehicle’s dash, which the vehicle’s occupants can use to manually place the emergency call. In both cases, an audio connection is first established between the vehicle and the local emergency services team to communicate further details about the accident. If the driver does not respond, emergency responders go directly to the scene of the accident. Thanks to precise information about the location based on GPS coordinates, the emergency responders even know in which direction of travel the accident occurred. This saves valuable time, as they do not first have to turn around at the next freeway junction to get to the scene of the accident. As a result, the automatic eCall enables emergency responders to arrive at the scene of the accident 40 percent faster in a city, while in rural areas, they can cut the usual response time in half.

A connectivity box that saves lives

T

he first automakers are already offering their customers eCall as part

76

SecurityLink India ■ April 2018


feature

of a vehicle’s navigation or infotainment system for a number of years. In such a set-up, what is installed in the car is not a standard eCall box, but rather an additional control unit that a connected vehicle uses to communicate with the outside world. At Bosch, this control unit is called the connectivity control unit, or CCU. It is the heart of connected mobility and the communication hub for eCall and other functions and services. The CCU registers a crash when the car’s airbags or seat-belt pretensioners are triggered. It then alerts rescue services or the Bosch emergency call center within a matter of seconds. Thanks to the transmitted GPS position, emergency responders arrive with speed and precision at the scene of the accident. However, the CCU can do much more than that. It is connected with additional sensors in the vehicle and knows, for example, how many seat belts are in use, and therefore how many people are in the car. As a result, emergency responders not only arrive faster, but also better prepared at the scene of an accident, since the appropriate number of ambulances can be requested directly.

eCall also speaks French

A

nyone who has had an accident while traveling internationally and had to explain the situation to the local emergency services team knows

what an obstacle foreign languages can be. This is why the eCall service from Bosch speaks 16 languages fluently, including French, Swedish and Turkish. Unlike standard eCall, which directly notifies the local emergency services via 112, Bosch eCall first alerts Bosch’s own emergency call center, which is manned 24/7, 365 days a year. Based on the navigation system’s language settings, the associates on the eCall team know which language the driver speaks, which enables them to quickly and directly inquire how the driver is doing and learn what has happened. This way, there are no communication problems, especially during a critical situation like an accident. The Bosch emergency team then coordinates all rescue operations with the local emergency services in the respective national language. These efforts make the local emergency responders’ job easier, as they know exactly what has happened and how they can specifically help. If the driver does not respond to the call from the Bosch emergency call center, associates alert emergency responders immediately. The service is not limited to Europe, either. Bosch offers its eCall service in more than 50 countries worldwide, including in Japan, Brazil, and North America. A number of automakers such as Daimler AG, are already opting for Bosch’s multilingual eCall service.

From cigarette lighter to lifesaver

T

he date of vehicle type approval determines whether a vehicle will come with the automatic eCall system as standard in the future. The eCall requirement applies to new vehicle models that go through the EU’s approval process for the first time beginning March 31, 2018, before hitting the market. Vehicle modSecurityLink India ■ April 2018

els with an earlier type approval may continue to be manufactured and sold without eCall. “For Bosch, no car is too old to be a lifesaver, which is why we have developed an eCall retrofit solution in the form of the telematics eCall plug,” Hoheisel says. The retrofit digital first responder for any car is simply inserted into a vehicle’s 12-volt socket (cigarette lighter). No appointment at a garage is necessary. Thanks to an integrated acceleration sensor, it registers collisions and accident severity. It uses Bluetooth to send this information to the corresponding app on the driver’s smartphone, which in turn alerts the service center of the vehicle insurers’ accident switchboard. Even with the retrofit solution, an audio connection is first established with the driver. If the driver does not respond, emergency responders are immediately dispatched to the scene of the accident.

For motorcycles as well

M

otorcyclists are among the road users most at risk – for riders, the risk of being killed in an accident is 18 times higher than for drivers. In light of this, Bosch is developing eCall not only for cars, but also for two-wheelers. A special CCU for motorcycles captures the bike’s operating data, which it uses to detect accidents. Thanks to an integrated GPS module, the exact location of the accident is transmitted to the emergency services call center. 77


product showcase

Expanding Support for Thermal and Speed Dome Cameras in Milestone XProtect® Software

H

ikvision has introduced a new plug-in for its thermal and speed dome cameras as a result of continuing collaboration with its strategic partner Milestone Systems. This gives operators a better situational awareness through visual verification of alarms. Hikvision’s plug-in for Milestone XProtect enables the operator to view ‘bounding boxes’ in the XProtect Smart Client and to receive alarms from a Hikvision thermal camera or speed dome. Bounding boxes appear around objects or people of interest and are used to visually identify them. Bounding boxes really improve the efficiency of operators. The bounding box surrounding the alarm-triggering object/ person changes color, enabling the operator to instantly

see where the alarm is, rather than searching through sometimes quite large areas on the screen. The bounding boxes also make it much easier to verify alarms in forensic investigations. This is a good news for customers, since they can build advanced solutions using both Hikvision cameras and Milestone software. The plug-in, which installs on top of the Milestone software, is based on Milestone’s SDK, and configuration and management is done from within the XProtect Management Client. The technology comes into its own in perimeter protection, on fire doors in buildings and dynamic fire detection. Applications include those areas with large areas to monitor, like airports, harbors, borders, industry and shopping centers. Jens Berthelsen, Partner Alliance Manager at Hikvision said, “Hikvision and Milestone have taken another important step in the direction of a very tight integration of the two product platforms. Using the well-developed Milestone SDK (MIP SDK), Hikvision has ensured an optimal support for our strong portfolio of cameras. This is a very appealing value proposal for the market, both making it easy for the integrator to install and configure, and also by ensuring the best possible visual verification possibilities for the operator.”

Multi-Band GNSS Receiver With Autonomous-Driving Precision and Automotive Safety Compliance

A

ssisting safer autonomous driving, STMicroelectronics has introduced the multi-frequency satellite-navigation receiver chipset suitable for safety-critical automotive applications and high accuracy positioning at the decimeter and centimeter-level for PPP and RTK applications. ST’s new Teseo receiver combines multiple-frequency (L1, L2, and L5) and multi-constellation tracking to correct positioning error for high-precision navigation. It is the first-in-class device that features built-in integ-

78

SecurityLink India ■ April 2018


product showcase

rity checking for use in safety-critical systems (ISO 26262 ASIL). It enables autonomous-driving systems to combine precise positioning with sensor data for enhanced system performance, safety, and reliability. Traditional in-car navigation systems help drivers reach their destinations using receivers and commercial satellite services that allow positioning accurate to within a few meters. With increasing use of autonomous systems such as lane-departure warning (LDW), adaptive cruise control (ACC), valet parking and auto-pilot, greater accuracy is needed to ensure safety and reliability, in combination with proximity sensors such as cameras, radar, lidar, and others, to monitor the driving environment automatically. Fully selfdriving vehicles of the future will also demand high-accuracy positioning. By tracking satellites of all GNSS (Global Navigation Satellite System) constellations simultaneously on at least two of the frequencies used by each system (instead of one in other products), ST’s automotive-quality Teseo APP (Automotive Precise Positioning) receiver provides high-quality raw GNSS data for PPP (Precise Point Positioning) and RTK (Real Time Kinematic) algorithm, which allows accurate positioning and rapid convergence time worldwide. In addition to its high accuracy, the industry-unique receiver monitors the integrity of the satellite data to alert the system if accuracy is degraded for any reason. This permits Tier-1 manufacturers to certify safety-critical systems in accordance with the automotive industry functional-safety standard, ISO 26262, up to the highest automotive safety integrity level (ASIL). Teseo APP also integrates a secure microcontroller for secure system boot and data-output authentication to keep sensitive data safe from attack. Launched alongside Teseo APP, ST’s Teseo V chip provides equivalent multi-frequency precise positioning in a simplified device for non-safety-critical applications where integrity assurance is not required. “High-accuracy satellite positioning makes autonomous driving safer, smoother, and more reliable,” said Antonio Radaelli, Director, Infotainment Business Unit, STMicroelectronics, “Our newest Teseo APP GNSS chip combines extreme accuracy and precision with industryunique integrity assurance for use in safety-critical applications.”

H.265 XVR Product Series

D

ahua Technology has recently launched its H.265 XVR product series. After upgrading its codec format from H.264 to H.265 and then to H.265+, H.265 XVR delivers a more cost-efficient storage method with smaller storage, stronger compatibility and enhanced intelligence, solving the much higher demand on storage capability placed by the widespread of 4K/ 4MP UHD devices, and offering the customers and partners more business opportunities.

Equal quality, smaller storage under H.265 codec

W

ith the H.265+/ H.265 supreme compression technology applied in HDCVI products, Dahua H.265 product series provides new choices for the video surveillance industry. As a cutting-edge video codec, H.265+ is able to reduce up to 90% of transmission bandwidth and storage while maintaining excellent image quality, resulting in the use of less HDD space and resources.

Seamless connection with strong compatibility

T

he widespread compatibility of the H.265 XVR guarantees a seamless connection with multiple cameras and all H.265 encoding-based platforms or devices. With a stronger processor, it even supports a maximum of 4 channels of intelligent video surveillance and a maximum N+N channels with IPC access, where each channel receives up to 8MP input. For existing video surveillance systems, H.265 XVR can also serve as an upgrade by replacing the storage

SecurityLink India ■ April 2018

79


product showcase

device only. Also, by converting audio into digital signal, the entire product series support broadcast-quality audio through loss-less audio transmission, vastly improving audio quality.

XVR 4.0 powered intelligent device

H

.265 XVR series brings a user-friendly experience with a new generation XVR4.0 GUI interface, providing with flat interface and simplified functional modules. Also, supported by IoT system, H.265 XVR product enables multidimensional surveillance by linking with diverse sensors to collect information such as temperature and humidity that can wirelessly trigger an alarm if necessary.

Keep working during power-cut with builtin battery

M

oreover, the built-in battery in the Dahua XVR E Model can feed the XVR and cameras to keep the surveillance system working for up to 1 hour, eliminating worries from unplanned power-cut.

VideoEdge Network Video Recorder First product to attain UL 2900-2-3 cybersecurity readiness certification

J

ohnson Controls’ VideoEdge network video recording platform from American Dynamics has become the first product to be officially certified as meeting the highest level of third-party cybersecurity standards from UL (Underwriters Laboratories) for Life Safety and Security, UL2900-2-3. UL’s Cybersecurity Assurance Program (UL CAP) tests network connectable products and systems against established criteria from the UL 2900 series of cybersecu80

rity standards. The UL CAP program also assesses a manufacturer’s processes for cybersecure product development, incident response, and internal ongoing testing and evaluation of security vulnerabilities of products. To garner the Level 3 certification the highest UL CAP designation, the VideoEdge NVR platform underwent a series of evaluations based on UL 2900-2-3, a standard developed specifically for the electronic physical security industry, which assesses a product’s software vulnerabilities and weaknesses, and reviews its exposure to exploitation and known malware. “The development of standardized, testable cybersecurity criteria by an organization such as UL, the preeminent security and life safety certification organization, provides a level playing field for end users and systems designers, who can now trust that a UL CAP certified product meets robust cybersecurity standards,” said William Brown, Senior Engineering Manager, Cyber Protection Program, Building Technologies & Solutions, Johnson Controls, “We’re extremely proud of this first UL CAP certification, as it encapsulates the ethos of our Tyco Cyber Protection Product Security Program and our product engineering, development and support culture, which is to provide our customers with solutions designed to meet a high degree of security and reliability and provide a positive operational impact.” “Submitting the VideoEdge NVR platform for UL CAP assessment and certification demonstrates Johnson Controls’ commitment to supporting their customers and end users,” said Ken Modeste, Director of UL’s Connected Technologies Business, “The product submitted by Johnson Controls meets science-backed third party industry best practices for cybersecurity, and thus provides them a higher level of trust and confidence.” The powerful VideoEdge NVR platform was developed under the Tyco Cyber Protection Product Security Program, which combines secure product development, testing and

SecurityLink India ■ April 2018


product showcase

evaluation, and configuration guidelines for compliance. The Cyber Protection Product Security Program approach begins with product design and continues once a product is in the field, a recognition that a product considered secure today may not be secure tomorrow. Through the rapid incident response service, the dedicated cybersecurity team quickly assesses new threats and vulnerabilities, and advises customers on how they may reduce their cybersecurity exposure.

tharishi, Avigilon’s Chief Technology Officer, “Operators can now use those descriptions, and within seconds, the Avigilon Appearance Search AI engine can search all cameras across an entire site to find a person of interest.” ACC 6.10 is expected to be available in the second quarter of this year and is a free upgrade to current users of ACC 6.

DJI Zenmuse XT2 Drone Camera

Gender and Age Added to

Appearance Search Technology Powerful new AI technology enhancement includes demographics when searching for a person

A

vigilon Corporation provider of trusted security solutions, will preview the next evolution of its award-winning Avigilon Appearance Search video analytics technology at ISC West 2018. Available in its upcoming Avigilon Control Center (ACC) 6.10 video management software, Avigilon Appearance Search technology will allow users to initiate a search for a person by selecting certain specific physical descriptions including hair and clothing color, gender, and age. The new feature is designed to provide security operators enhanced speed and flexibility when conducting a search for a person. “While investigating critical events, time is of the essence, and security operators are often provided physical descriptions of the people involved,” said Dr. Mahesh Sap-

Avigilon Appearance Search technology allows users to search for a person by selecting physical descriptions including hair and clothing color, gender, and age

FLIR Provides thermal imaging for next generation DJI Zenmuse XT2 dual-sensor commercial drone camera Companies extend collaboration as DJI joins ‘Thermal by FLIR’ thermal innovation program

D

JI, the world’s leading provider of civilian drones and aerial imaging, will integrate a FLIR thermal imaging sensor technology into its new DJI Zenmuse XT2 drone camera. The DJI Zenmuse XT2, DJI’s first dual-sensor and its most advanced gimbal-stabilized camera for commercial drone applications, furthers the collaboration between FLIR® and DJI. The Zenmuse XT2 also joins the ‘Thermal by FLIR’ partner program, which FLIR created to fuel thermal innovation and allow partners to leverage the leadership, quality, and innovation that FLIR’s brand represents in the thermal imaging space. Built with industrial and public safety applications in mind, the DJI Zenmuse XT2 expands upon the benefits in the first thermal-equipped camera jointly developed by FLIR and DJI, the DJI Zenmuse XT. The new drone camera includes both a high-definition 4K color video camera and a high-resolution radiometric thermal camera, allowing operators to switch between thermal and visible cameras in flight. The Zenmuse XT2 also uses FLIR’s patented MSX® technology, or multispectral dynamic imaging, that embosses high-fidelity, visible-light details onto the thermal imagery to enhance image quality and perspective. The Zenmuse XT2 is compatible with the DJI Matrice

SecurityLink India ■ April 2018

81


product showcase

600 and Matrice 200 series platforms and integrates with DJI’s data transmission technology for live video display. Full integration gives drone operators plug-and-play installation, real-time control, and recording during flight in thermal, visible, or thermal/ visible picture-in-picture. This flexibility allows operators to acquire double the data in a single camera and stay focused on mission-critical tasks. “The arrival of the DJI Zenmuse XT2 with a FLIR sensor signifies an important technological advancement for drone operators who need both a visible camera and the superpower benefits of thermal imaging in one product,” said James Cannon, President and CEO of FLIR, “Now drone operators can capture data without landing, an important advantage for search and rescues operations, monitor the health of mechanical and electrical equipment remotely, and identify potential problems in buildings. Our collaboration with DJI perfectly aligns with our mission to use our thermal technology to help save lives and livelihoods.” “Since the introduction of our first FLIR camera in 2015 we have seen strong demand for thermal imaging-based products because they have helped transform DJI drones into essential and often lifesaving tools across a wide variety of industries,” said Roger Luo, President at DJI, “We are excited to introduce our next generation product together, the Zenmuse XT2, which is easier and more efficient to operate, and further demonstrates our commitment to innovation in the commercial drone industry.” DJI is one of multiple partners involved with the new Thermal by FLIR program, created to support original equipment manufacturers (OEMs) and product innovators interested in using the FLIR thermal imaging sensors to deliver the benefits of the World’s Sixth Sense. The program ensures that original equipment manufacturers and entrepreneurs can carry the Thermal by FLIR brand and receive additional product development and marketing support from FLIR to build and market their respective products. Additional Thermal by FLIR partners include Cat Phones, Casio, Panasonic, ARSENZ, and TinkerForge. 82

Risk Management Solution for Identity & Access Management With Artificial Intelligence and Machine Learning Capabilities ID Global® has introduced a new cyber threat and fraud detection service that brings artificial intelligence (AI) and machine learning to identity and access management, addressing the rising incidents of cyber attacks, especially against financial institutions. The new HID Risk Management Solution is a real-time risk profiling technology that uses data analytics to protect financial transaction systems and banking applications against cybercriminals. The ever-changing threat landscape that makes it more challenging to secure online and mobile financial applications has created an urgent need to improve the detection of fraud and cyber attacks and accelerate the prevention of costly damage. The new HID Risk Management Solution meets this need by combining evidence-based detection capabilities and behavioral biometrics, supported by machine learning. This HID cyber security solution is designed to protect banks, online merchants and service providers against zeroday malware, account takeover, phishing attacks and bots, among other threats. “The HID Risk Management Solution gives businesses and consumers a new defense against cybercrime,” said Brad Jarvis, Vice President and Managing Director of Identity & Access Management (IAM) Solutions with HID Global, “By combining HID’s expertise in identity and access management with new capabilities in AI and machine learning, we are enabling organizations to better manage risk, protect customer data and defend against fraud, malware and data breaches. The combination of our HID Risk Management Solution and our mobile-based authentication application, HID Approve, creates a unique blend of security and user authorization.” Adding trust to online transactions and preserving the integrity of digital business interactions, the HID Risk Management Solution is fully integrated with HID’s ActivID® authentication platform, which provides multi-factor authen-

H

SecurityLink India ■ April 2018


product showcase

tication to protect users’ IDs, transactions, devices and accounts. The merging of multi-factor authentication with the new level of AI-driven, cyber threat and fraud detection is a strategic advancement that delivers risk-based, frictionless and adaptive authentication based on data intelligence. It increases security while optimizing the user experience as seamless – without any inconvenience to consumers. The HID Risk Management Solution is composed of three different risk-based engines that are fully integrated together and deliver a more accurate risk score than other systems from other vendors. ●● Threat engine: Detects generic threats and tracks device IDs, identifying application integrity tampering, malware and phishing attacks. ●● Behavior engine: Creates a behavioral biometric profile of the user, including keyboard, mouse and swipe behavior, page navigation and application usage. ●● Anomaly engine: Monitors the details of transactions in real-time, utilizing machine learning methods to identify anomalous sessions and transactions, as well as continuous analysis of hundreds of parameters. The risk score that is generated from these three ‘engines’ enables more informed decision-making about the next action, whether to approve, block or reject a transaction. The data analytics from the IAM solution creates new value for customers.

60W EDS-P506E-4PoE Series Switches To Power heavy-duty IP cameras in harsh environments

M

oxa has launched the EDS-P506E-4PoE series of PoE switches that can provide up to 60 W per PoE port for converged data and power transmission. The power output was designed for IP cameras that use power-demanding functions such as PTZ, illumination, heaters, and fans in harsh environments. The EDS-P506E-4PoE switches feature device-level cybersecurity, remote control, and the capability to monitor powered devices to meet the operational require-

ments for industrial applications such as highways, wayside, and public utilities.

60W PoE

T

he EDS-P506E-4PoE has 4 Fast Ethernet PoE+ ports that can supply up to 60W per port with a total power budget of 180W. The smart PD detection feature and plug-and-play integration allow it to supply power to any PoE PD effortlessly. As the industrial world continues to become smarter and more connected, cities and industry sectors are installing video surveillance systems to enhance safety and security. “As our EDS-P506E-4PoE switches can provide up to 60W per PoE port, almost any type of PTZ cameras using multiple functions can be powered reliably,” said Jackey Hsueh, Product Manager of Moxa’s Industrial Ethernet Infrastructure Division.

Web-based smart PD management

J

ackey adds, “One of the most appealing features of the EDS-P506E-4PoE is the built-in smart PoE software that facilitates web accessible PD diagnostics and management.” The smart PoE provides automatic PD detection of power class, status and errors for smart diagnostics, and enables failure check, which can automatically reboot cameras if they freeze or experience lag. These features increase operational efficiency and significantly reduce the effort required by maintenance staff.

Robust switches that support device-level security

T

o ensure maximum uptime for data and power transfer in harsh conditions, the EDS-P506E-4PoE supports millisecond-level failover redundancy, dual power inputs, and -40 to 75°C wide operating temperature range to ensure constant and robust connections. The switches incorporate security features that are based on the IEC 62443 standard to protect the network from unauthorized device access. Jackey concluded, “Our compact PoE switches have a rugged design, embedded cybersecurity protection, and level-4EMI immunity to withstand cyber threats and harsh environments.”

SecurityLink India ■ April 2018

83


product showcase

EDS-P506E-4PoE highlights

●● 2-port Gigabit and 4-port Fast Ethernet with PoE+/ 60W functionality. ●● Up to 60W output per PoE port. ●● Supports 12/ 24/ 48 VDC wide input voltage. ●● Web-based smart PoE tool for easy operation and monitoring of PoE powered devices. ●● Cybersecurity features based on the IEC 62443 standard. ●● 4 kV LAN surge protection and -40 to 75°C operating temperature tolerance. ●● Supports MXstudio industrial network management suite for large-scale deployments and management. ●● Compliance with the IEC 61850 and IEEE 1613 standards.

performance and quality. “The QNAP unmanaged switch series is excellent for home and small business users,” said Ken Cheah, Product Manager of QNAP, “The versatility of these 10GbE switches allows users of 10GbE-equipped QNAP NAS and virtually all 10GbE/ NBASE-T-ready servers to fully leverage the high-speed potential of their devices, services, and infrastructure for greatly improving workflows and enhancing day-to-day tasks.” The QSW-1208-8C and QSW-804-4C can function as a desktop-based or rackmount-based solution (a free rackmount kit is included in the package). Both switches feature a sleek modern design to blend in with other devices in digital homes and offices. The smart fan mechanism enables efficient heat dissipation to ensure high performance while staying near-silent for minimizing background noise.

Delivers Affordable 10GbE Connectivity with

QSW-1208-8C and QSW-8044C 10GbE/NBASE-T Switches NAP® Systems, Inc. has recently released the QSW1208-8C (twelve-port) and QSW-804-4C (eight-port) 10GbE/ NBASE-T™ unmanaged switches to help home and small business users upgrade their networks to accommodate 10GbE speeds for bandwidth-demanding tasks. The NBASE-T-based switch delivers a cost-effective solution for improving network performance while using existing Cat 5e, 6 and 6a cables. The QSW-1208-8C has twelve ports, including four SFP+ (fiber) and eight SFP+ (fiber)/ RJ45 (copper) combo ports while the QSW-804-4C has eight ports, including four SFP+ (fiber) and four SFP+ (fiber)/ RJ45 (copper) combo ports to ensure an optimized investment in 10GbE networking. The QSW-1208-8C and QSW-804-4C are also backward compatible with legacy devices, and support the IEEE 802.3az (Energy Efficient Ethernet, EEE) standard for reducing power consumption while maintaining high network

Q

84

Enhanced ID Documents

Unveiling two new enhanced security features for ID documents After successful implementations, Gemalto invests further in color laser engraving technology to boost fraud protection and ease verification

G

emalto has recently launched two new laser-personalized innovations designed to further increase the security of official identity documents. These advanced security features are available immediately as additional options in the Gemalto Color Laser Shield (also known as ‘Color in Polycarbonate) secure identity solutions range and are supported by major brands of personalization equipment. Color laser engraving is the most secure way to personalize documents. It has won the trust of progressive government bodies worldwide and is gaining further momentum in 2018. In addition to color portraits of exceptional sharpness secured by four color lasers, the two new security features can

SecurityLink India ■ April 2018


product showcase

tions in the very near future,” said Youzec Kurp, Senior Vice President ID Document Solutions, Government Business Unit, Gemalto, “Our investments and proven expertise in this high technology domain allow us to be an innovation leader, providing superior security features for ID and passport design that are unique in the market. They offer the best tools against fraud and creative answers to the evolving demands of government authorities and high security printers.” now be applied to the polycarbonate documents such as national ID cards, passports, healthcare cards, driver’s licenses, voting and resident permit cards. The new enhancements are highly sophisticated but simple to adopt by the government agents in the field. They are designed to counter forgery while remaining easy for officials to verify their authenticity, thereby providing greater convenience for legitimate holders. Gemalto Color Variable Microtext adds color to personalized microtext, a strong level 2 security feature (visible with a magnifier). It combines color and high resolution to engrave sharp characters and is difficult to forge and copy. Only authorized entities can access Color Laser Shield technology.

Gemalto Color Window, a transparent window inside the polycarbonate card, which is color laser-engraved with a portrait making it impossible to copy and enabling quick checking. Any attempts by forgers to tamper with the document will be immediately visible. As a see-through element in color, it is an ‘eye catcher’ that enables instant inspection of the entire layer structure. “These two new features are part of our ongoing commitment to constant improvements in the security of our products. The Gemalto Color Laser Shield technology launched in 2014, also known as Color in PC, will see further innova-

VR-Enabled FARO ZONE 3D 2018 New virtual reality capabilities for forensics and security planning ARO® trusted source for 3D measurement and imaging solutions for factory metrology and public safety forensics, announces the availability of the next generation of the FARO Zone 3D software platform FARO Zone 3D 2018. The FARO Zone 3D platform is specifically designed to enable investigators and security professionals to enhance the quality of the site and evidence capture, documentation, reconstruction, and analysis for crime, crash, fire and security applications. It is the first VR-enabled software solution for law enforcement and forensics professionals that provides a comprehensive platform for documenting, analyzing and reconstructing scenes that includes powerful forensic analysis, 3D diagramming, and animation tools. Additionally, with integrated virtual reality, FARO Zone 3D 2018 enables a completely immersive first-person environment. Users can now revisit and walk through the scene, analyze the events leading up to the scene and create full animated reconstructions of the scene just as if they were there when it happened.

F

Virtual reality analysis

B

uild a repository of training scenarios by turning every scene into a real-world training environment.

Visual impact

●● Create stunning diagrams and animations with new

SecurityLink India ■ April 2018

85


product showcase

smoke, fire and explosion animations, shadows, moving wheels and trailer articulation. ●● Create dynamic videos with total view, a unique presentation tool for fly-throughs and walk-throughs of scenes that are ideal for courtroom presentations, classroom training, and security debriefings.

innoVi™ Integrated with XProtect VMS gent Video Intelligence (Agent Vi™) and Milestone Systems has announced the integration of innoVi™ for Central Monitoring, Agent Vi’s cloud-based video analytics Software-as-a-Service (SaaS), with Milestone XProtect™ video management software. Central monitoring stations (CMS), Alarm receiving centres (ARC), and enterprises deploying Milestone XProtect will now be able to benefit from Agent Vi’s cutting-edge video intrusion detection service. innoVi for central monitoring delivers accurate and automatic detections of security breaches at remote sites with immediate video verification. By implementing state-of-the-art computerized vision technology powered by deep learning, innoVi provides superior detection performance without requiring the lengthy finetuning usually associated with video analytics setup. innoVi integrates seamlessly into XProtect, enabling security breaches detected by innoVi to be presented within the XProtect™ Smart Client. The event details and accompanying high-resolution, high FPS video clip allow surveillance operators to quickly review the video footage and respond accordingly. innoVi’s superior analytics performance enables Milestone’s central monitoring and enterprise customers to expand the number of sites monitored, and to increase the level of security and incident response offered, without increasing the number of security staff. “This integration expands the long-standing partnership between Agent Vi and Milestone, and opens up new sales op-

A

Advanced smart tools

●● Dramatically increase productivity with the enhanced Blood Spatter Analysis Smart Tool that detects edges of blood droplets and automatically creates trajectory lines through FARO Zone 3D’s artificial intelligence engine. ●● Automatically generate courtroom ready reports detailing each trajectory with the enhanced Bullet Trajectory Smart Tool that makes bullet trajectory analysis easier than ever – now featuring elliptical trajectory cones and the ability to extend trajectory lines beyond the plane of impact.

Extensive training support

●● Optimize the beneficial use and return on investment of FARO Zone 3D through unlimited access to live instructor-led online training, as well as self-paced training modules through the FARO Academy learning management system.

Sharing and collaboration

●● Easily share 2D, 3D and 3D point cloud scenes and videos in the courtroom, across the street, or around the world with the new free, stand-alone, FARO Zone Viewer application. “FARO Zone 3D represents another step forward in our focus to create complete solutions for investigators in the crime, crash, fire, and security markets,” stated Jeff Ruiz, Vice President Public Safety Forensics, “Integrated virtual reality makes investigators’ analysis more powerful, more persuasive and more real than ever.” 86

SecurityLink India ■ April 2018


product showcase

portunities by enabling CMSs and ARCs to access innoVi’s powerful video intrusion detection capabilities seamlessly through the Milestone XProtect Smart Client,” said Zohar Adler, Director of Product Management at Agent Vi. “Agent Vi’s well-established standing as a Milestone solution partner has been proven time and again in successful customer installations around the world, and they continue to develop video analytics with innovative technologies that are moving the industry forward. innoVi for central monitoring leverages the efficiencies of cloud infrastructure for dispersed locations, to improve overview and video verification for optimal response,” said Mike Sherwood, Director of Technical Services at Milestone Systems.

Axxon Next 4.1

A

xxonSoft presents version 4.1 of the Axxon Next VMS. This version presents new features for video analytics and search, the newly released AxxonNet cloud service, Failover mode, and many improvements to existing functionality.

AxxonNet

A

xxonNet is a free cloud service that connects to Axxon Next surveillance servers via the Internet. SSL encryption ensures that data is transmitted securely. AxxonNet can be used to: ●● Remotely view live video streams and recordings from surveillance cameras via the web interface. ●● Receive email alerts for pre-configured events. Save video of events to the cloud for remote viewing. ●● Send push notifications about specified events to the AxxonNext mobile app. ●● Create users and roles in the Axxon Next system. ●● Store product license files.

captured at different times are displayed simultaneously in a condensed ‘video synopsis.’ One can adjust the maximum number of objects/ events to be shown on screen from 2 to 16 to control object/ event density. Thanks to a combination of two video analysis technologies, searching for a specific video recording is now even easier and faster. The IntelliVision license plate recognizer is integrated into the ANPR system. Added features: ●● Recognition of license plates from Belarus, Norway, France, Kenya and Ethiopia. ●● Improved quality of license plate recognition in extreme conditions (such as rain or snow). ●● Multiple country selection (up to 5 at a time) for detecting license plate numbers.

Video analytics

N

eural network fire and smoke detection tools have been integrated. They are designed for early detection of fires in conditions where standard fire and smoke sensors are ineffective such as in open areas or in large enclosed spaces with high ceilings or intensive air circulation. On configuring the basic motion detection, the preview window displays the motion mask for visualizing the sensitivity. For any motion that remains under the threshold value, the mask cells are green. If motion triggers VMD, the cells turn red. This means that adjusting the motion detection sensitivity is now much easier.

Search in video archives

N

ow one can view search results in Time Compressor mode for face search, license plate number search, or the MomentQuest forensic search. Objects and events SecurityLink India ■ April 2018

87


product showcase

When a camera is added to the system, motion detection recording is automatically activated with the default settings, which is the most frequent type of recording, thereby video surveillance system gets up very quickly, without investing a lot of time in configuring individual cameras.

Failover

F

ailover provides maximum reliability for a distributed video surveillance system by quickly switching to a standby server when communication with the main server is lost. The standby server automatically takes over all functions from the off-line or malfunctioning server. Video transmission to the operator’s screen and recording to the archive resumes immediately.

Tag & track

T

ag & TrackLite, the feature for following an object that moves between different cameras’ FoV, now also works in archive mode. When an object is selected, it immediately switches to the camera archive where it should appear, and playback starts from that moment.

New Traffic Sense Platform Next generation traffic operations platform unifies video management and traffic systems with dynamic decision support, now available

G

enetec has announced that its next-generation traffic operations platform, Genetec Traffic Sense™, is now available. Genetec Traffic Sense introduces a new, modern and highly efficient way to manage traffic operations. It delivers a unified view of real-time conditions and vehicle flow to cities, bridge and tunnel operators, state transportation departments, and border crossing agencies, so they can identify and respond to incidents more efficiently, with a complete view of the traffic situation. 88

Real-time notifications, automated workflows and guided responses enable traffic management operators to make timely decisions, resulting in drivers getting to their destinations faster. Displaying data on a single interface cuts through the noise and lets operators focus on the tasks that matter – whether that is dynamically updating electronic road signs, or dispatching emergency response units. With Traffic Sense working silently in the background to guide traffic operations teams, drivers experience smoother, quicker journeys – no matter how fast technologies and environments evolve. “The growing adoption of new traffic technologies, ride sharing, connected vehicles, and eventually, self-driving cars, means keeping pace with infrastructure developments is harder than ever. Traffic Sense gives traffic management operators the ability to adapt to these changes. It improves their incident response times, while providing drivers with vital journey information to reduce their travel time and decrease congestion,” said Christian Chénard-Lemire, Team Lead for Intelligent Mobility at Genetec. Traffic Sense unifies traffic data, dynamic message sign control, video monitoring, video analytics, and incident management. By tapping into a variety of data sources from roadside sensors to third-party probe data for travel-time analytics, Traffic Sense automatically identifies congestion and abnormal traffic conditions. It correlates traffic data with associated video feeds, all displayed within dynamic maps of roadways, giving operators instant and complete awareness of what is happening. Armed with this information, traffic operators can quickly bring things back to normal following an incident. Traffic Sense enables organizations to define response plans to guide their operators and ensure that teams respond to incidents in a consistent, efficient and less stressful way. By presenting standard operating procedures on-screen, Traffic Sense guides operators through every step of the process, from identification to resolution. With Traffic Sense, operators can also update signs along affected roadways directly within the software platform, ensuring drivers are well informed at all times. While traditional advanced traffic management systems require extensive custom development, and are slow to adapt to changing environments, Traffic Sense is an open platform designed to quickly and seamlessly integrate new and emerging technologies. This reduces customers’ total cost of ownership and shortens implementation cycles significantly.

SecurityLink India ■ April 2018


product showcase

Faster Emergency Response with

Multimodal IXM TITAN

New Digital Key Solution

(ISC West 2018)

I

nvixium, an innovator of biometrics solutions, will be unveiling a new benchmark in multimodal authentication technology at ISC West 2018. The new IXM TITAN promises to be the most advanced biometric product ever engineered, reflecting Invixium’s drive to become the world leader in multi-purpose authentication solutions. TITAN is equipped with facial recognition as the primary biometric modality, fingerprint or finger vein authentication as the secondary, and consolidates features for access control, time and attendance, video intercom and video surveillance into a single device that accommodates a diverse host of applications with extreme efficiency and convenience. TITAN was conceived and engineered using a unique set of design parameters including unparalleled application versatility, simplicity of use and implementation, industryleading processing power and exquisite aesthetics that clearly differentiate it from traditional biometric devices.

“TITAN is a master stroke,” says Shiraz Kapadia, CEO and President of Invixium, “We engineered TITAN to be an iconic biometric product – beautiful enough to be installed in luxury homes and corporates, extremely rugged for installation in the harshest environments, technologically futuristic to be an IoT connected device, and security focused with its multimodal and multifactor authentication versatility. The introduction of IXM TITAN at ISC West is a milestone for Invixium as this marks our entry into North America with a plethora of biometric products and solutions.”

E

mergency services will save vital time thanks to SOS Digital Access, a tailor-made solution which provides unique digitized key management for personnel responding to alarm calls.

The result of a collaboration between ASSA ABLOY, Swedish emergency security provider of SOS Alarm and access software company Amido, SOS Digital Access enables immediate temporary access rights to a building for emergency services personnel responding to a call. Compatible with all types of credential – key fobs, key cards and mobile keys – SOS Digital Access will initially be launched for automatic fire alarms and is aimed at a broad range of property owners. SOS Alarm will be able to provide the emergency response personnel with physical access rights, for faster and safer entry. SOS Digital Access works with the customer’s existing access control system, making it both future-proof and economic to install. “SOS Digital Access is easy to install in all types of property without major investments or remodeling,” says Peter Kazinczy, President ASSA ABLOY, “In essence, it requires a single investment to adjust the main entrance and other necessary openings. This makes our joint solution economically and environmentally sustainable.”

SecurityLink India ■ April 2018

89


product showcase

Ocularis VMS 5.5

Delivering Expanded Integrations & Automated Features Features new smart camera drivers, increased security and higher reliability

O

nSSI releases Ocularis 5.5, the latest update to the company’s industry leading video management software (VMS) platform. Ocularis 5.5, which is now available, includes new integrations and automation functions that increase overall performance and cost-efficiency. “This latest release of Ocularis provides a long list of new features and improvements that solve the emerging needs of users across a wide range of applications to deliver the latest functionality for enterprise level surveillance operations,” said Ken LaMarca, VP of Sales & Marketing, OnSSI, “Ocularis 5.5 is not only more user-friendly, it also helps operators save more time and money, while maintaining the highest levels of security.” Key enhancements of Ocularis include new smart camera drivers for Dahua and Panasonic cameras that provide immediate support for all new cameras without the need to wait for individual camera drivers or driver packs. OnSSI’s smart camera drivers from most major camera manufacturers allow users to take advantage of the most advanced camera features right away, without having to update their recording servers. Expanded support for H.265 compression to also include Axis Communications, Dahua, and Panasonic cameras provides exceptional image quality while dramatically reducing bandwidth usage and storage requirements. Additional features in Ocularis 5.5 include: ●● Ocularis base & administrator: Recorder configuration changes are now made automatically inside Ocularis base, resulting in an easier process with fewer steps, which also results in time savings. Admin users in Ocularis are encouraged to change the default password with visual feedback on the strength of the password to help provide additional security. In addition, a new system status tab allows the operator to see immediately which devices are online or offline and further reduces bandwidth for multi-site installations. Reports of the status of 90

the system can easily be generated for maintenance and reporting purposes. ●● Ocularis Web: Enhancements include an added bookmarking feature in Ocularis Web, for faster access to important video for more efficient investigations. ●● Ocularis client: Improvements include a new playback mode of alarm recordings only, reducing bandwidth and increasing event notifications and video call-up times. Ocularis 5.5 is available in three models: Professional, designed for organizations operating multiple locations with small to mid-sized camera counts; Enterprise, built for a wide range of mid to large IT-centric organizations; and Ultimate, created for large organizations with extended command and control needs and recording server fail-over.

New Vehicle Sensors (Intertraffic 2018)

O

PTEX, the leading manufacturer of detection solutions, has launched a new series of highly reliable and very easy to install vehicle sensors in Europe Middle East and Africa (EMEA) at recently held Intertraffic in Amsterdam, The Netherlands. The ViiK vehicle sensor series will comprise two models – the OVS-01GT, designed for gate, barrier or industrial door activation, and the OVS-01CC as a moving vehicle counter. Both sensors are centred around frequency-modulated-continuous-wave (FMCW) technology. The above ground ViiK vehicle detectors are an ideal solution for sites where ground loops cannot be installed such as where the road surface is damaged or unsealed, paved with

SecurityLink India ■ April 2018


product showcase

cobblestones, or above drains or pipes. The ViiK OVS-01GT model, which combines microwave with ultrasonic technology to sense both a vehicle’s movement and presence, is especially suited to sites where induction loops may have previously been considered, but the customer does not want disruptive ground works. The OVS-01GT detects the presence of small or large stationary or moving vehicles within 5.5 meters while ignoring human traffic. It is easy to install; unlike ground loops, no civil works are required as the device is mounted at circa 500mm from the ground. The OVS-01GT connects to an automatic gate, barrier or industrial door operator, and includes menu programming, five sensitivity settings and five human cancelling selections, all with one-button calibration. It suits simple gate activation applications as well as being part of state of the art parking systems. The OVS-01CC can detect and count small or large moving vehicles up to 60km/h in single lane applications. The vehicle counter can similarly be mounted quickly and easily on a pole or wall at 90 degrees. Its detection area (up to eight metres) can be customised with eight range settings, five sensitivity settings and one-touch calibration. Perfectly suited for counting cars in open retail parks, or monitoring traffic in high streets. Jacques Vaarre, Managing Director for OPTEX EMEA, says that after having successfully launched the new range of vehicle detectors and counters in Japan and in North America, they are delighted to introduce the ViiK range to the EMEA market at Intertraffic. “It gives users a viable choice over ‘traditional’ ground loop sensors – both models are highly reliable and very easy to install. By choosing an OPTEX detector, you are losing none of the performance, but gaining all of the benefits by not having to dig up the roads or disrupt traffic,” he added, “Step by our booth at Intertraffic to learn more about the vehicle sensor applications and to get acquainted with these new sensors in the Optex sensor product range.”

Hdcvi-Iot Series

D

ahua Technology has launched HDCVI-IoT product series – a crucial component of HDCVI 4.0. IoT (Internet of Things) means linking devices together. HDCVI-IoT is an IoT infrastructure based upon HDCVI technology, offering a comprehensive ecosystem linking conventional HD-over-Coax video and audio data with sensor information (such as temperature & humidity) and alarms. This offers users potential risk warnings with visual evidence, allowing them to secure personnel and property across all dimensions.

Linca series

●● DH-HAC-LC1220T-TH: As 2MP HDCVI temperature and humidity camera, it records and uploads video with real-time environmental information using built-in temperature & humidity sensor, perceiving sudden changes for early warning. It boasts a detection range of -40° to 60°C/ 10-95%RH with an accuracy of ±2°/ ±5%RH. ●● DH-HAC-LC1200SL-W: It is a 2MP HDCVI gateway camera that integrates up to 32 wireless alarm devices such as smoke detector, door contact or siren, to establish a corresponding system providing visual records for triggered alarms, with built-in Airfly transmitter supporting global frequency 433/868/ 915Mhz.

MotionEye series

●● DH-HAC-ME2802B/ ME1400B/ ME1200B: The 8MP/ 4MP/ 2MP HDCVI MotionEye camera specializes in accurate motion detection based on video and built-in PIR. While effectively decreasing the false alarm rate, the camera with a max video output of 25/ 30fps@4MP/ 1080P provides intrusion detection with visual alarm verification.

HDCVI IoT recorder

●● DHI-XVR7000E-4KL-X: It offers centralized IoT management with user-friendly UI, displaying real-time IoT data and producing statistic reports. With elegant new

SecurityLink India ■ April 2018

91


product showcase

ASR-NG Deployable ATC radar Combining superior performance with air transportability

HDCVI-IoT includes the following devices

appearance design, it also supports built-in battery for emergency power-off.

Accessory

●● DH-PFM871A-N: The HDCVI-IoT USB dongle attached to the XVR enables access to multiple wireless alarm devices such as smoke detectors or door contacts, within a transmission distance up to 500m.

Application scenarios

●● Warehouse of food, medicine and chemicals: Temperature and humidity must be kept within specific range to reduce damage or danger. With HDCVI-IoT, when the concerning index goes beyond the number one sets, the alarm will be triggered instantly.

Museum & library

H

ENSOLDT, the leading independent sensor house, brings a new variant of its powerful ASR air traffic control (ATC) radar family onto the market. The new product designated ‘ASR-NG Deployable’ is a rapidly deployable ATC radar complying to all ICAO, Eurocontrol and safety standards for civil and military ATC. It capitalizes on the superior detection performance and accuracy of the stationary ASR-NG variant combined with air transportability in one aircraft and a deployment time of less than six hours. The ASR-NG Deployable will be delivered to the first customer in the course of the year. “The versatility of our new product combined with ASRNG’s superior performance makes it ideally suited for ATC purposes in joint and combined missions of expeditionary units,” explains Thomas Müller, CEO, HENSOLDT, “Thus, it allows for maximum efficiency of combined air, ground and naval forces while contributing to safe operations and avoidance of friendly fire.” The ASR radars consist of an integrated primary and secondary radar system each. The primary radar helps to

R

elics in museums and books in libraries require a strictly controlled storage environment. HDCVI-IoT, while ensuring meticulous monitoring, also records all data in regular reports.

Farm & greenhouse

T

he growth of plants and animals are very sensitive to the environment. HDCVI-IoT, with real-time environmental data superimposed on the monitoring video, optimizes management efficiency. By integrating sensing information, video and IoT, HDCVI-IoT offers comprehensive surveillance. With a mission of ‘Enabling a safer society and smarter living,’ Dahua will continue to focus on ‘Innovation, Quality, and Service,’ to serve partners and customers around the world. 92

SecurityLink India ■ April 2018


product showcase

detect non-cooperative objects such as small aircraft that do not have transponders or hostile aircraft. It is based on a semiconductor transmitter and includes special signal processing techniques for wide-area surveillance and windfarm mitigation. The secondary radar, MSSR 2000 I, ensures the automatic identification of cooperative aircraft. This secondary radar meets the new ‘Mode S/Mode 5’ air traffic control standard, which greatly improves aircraft identification queries. It is currently being introduced in all NATO and allied forces.

Next Gen Control Room Automation At ISNR 2018 NL Software has presented its IPSecurityCenter™ PSIM solution on its stand at the International Security National Resilience Exhibition & Conference (ISNR) in Abu Dhabi, 2018. CNL Software had invited AXIS Communications and Quanergy to demonstrate automated threat detection, tracking and escalation in real time using the latest PSIM, LiDAR and video technologies. CNL Software continues to invest heavily in the Middle East region, and has already established a fully functioning team based in Abu Dhabi, which offers operations, sales, delivery, support and development capabilities to support its PSIM customers and partners in the Middle East. “For this year’s ISNR, we took a different approach to the exhibition. We are excited about our collaboration with Quanergy and Axis Communications, as they share the same passion for technology and innovation within the security industry,” says Craig Menzies, General Manager, CNL Software – ME, “Combining IPSecurityCenter’s rules based processing power, with the ability to automatically detect and track pre-programed threats offers unparalleled automation capabilities within the control room. Not only does this enable greater efficiencies within security, automation offers greater resilience as these systems work day and night, rain or shine.”

C

“ Q u a n e r g y ’s LiDAR sensor and Qortex perception software increase the efficiency of an organizations security capability significantly, which is enhanced through IPSecurityCenter, by detecting, tracking and classifying threats in real-time, and controlling the AXIS Communications PTZ camera to follow a unique subject throughout a designated area,” says Dr. Louay Eldada, CEO of Quanergy, “This unique blend of hardware and software provides an integrated platform with CNL Software and AXIS for an entirely new level of security automation and smart awareness.” The solution offers major advancements within critical infrastructure protection, corporate security, retail security, mass transportation systems, safe city programs, policing, ports and a variety of other sectors within the global security industry.

New Test Set For addressable protocol commissioning and fault-finding

A

pollo Fire Detectors, the world-leading independent fire detection manufacturer, announces the launch of its new Apollo Test Set – a portable testing device designed to help commissioning and system maintenance engineers across the globe. The Apollo Test Set has been created to allow the commissioning and fault-finding of Apollo devices on sites worldwide, interrogating and controlling all units connected to the device, either as individual units or complete circuits. With its user-friendly touch screen display, the Apollo Test Set, works on all of the Apollo analogue addressable proto-

SecurityLink India ■ April 2018

93


product showcase

our Apollo systems – making their life easier in the field, reducing their on-site time and cutting project installation and maintenance costs. We’ve used the latest technology to make this one device compatible with our three main protocols, XP, Discovery and CoreProtocol®, plus we’ve added the capability for users to download any software updates, futureproofing the Apollo Test Set. This new piece of equipment is the perfect example of our commitment to innovative and reliable fire detection solutions.”

cols – XP95, Discovery and Core Protocol®. The main function of the Apollo Test Set is to help engineers guarantee the correct loop configuration is in place before an active control panel is installed. To do this, either the loop or individual addresses can be connected to the unit using loop connection ports located on the top of the device for easy access. The device also has the functionality to test the diagnostics and integrity of the loop to discover earth faults and other system weaknesses. Incorporating a host of functions, the Apollo Test Set allows the user to interrogate the devices in different ways. The standard view allows devices to be scanned and controlled through the manipulation of their output. Devices can also be self-tested and the different functionality modes can also be controlled. To further ensure portability and ease of use, the Test Set can be powered from an AC mains charger unit or by its own internal batteries. Ed Browning, Sales and Marketing Director at Apollo, commented, “We are very excited to launch our new Apollo Test Set, which will greatly assist Engineers working with

94

Demonstrating Interoperability of BrainChip Studio with StorNext File System Demonstrations available during ISC West 2018 in Las Vegas, NV

B

rainChip and Quantum have jointly verified interoperability between their respective products. Quantum is a leading expert in scale-out tiered storage, archive and data protection, providing intelligent solutions for capturing, sharing and preserving digital assets over the entire data lifecycle. The integration of BrainChip Studio’s AI-powered object search and facial classification algorithms and Quantum’s intelligent StorNext® scale-out file system provides end users with rapid storage searches for less overall cost. Quantum’s StorNext is a cost-effective storage system designed for video applications. BrainChip Studio aids law enforcement and intelligence agencies to search vast amounts of video footage many times faster than previously possible, enabling them to quickly identify objects or faces. The combination of these two products provides an ideal solution for law-enforcement, counter terrorism and intelligence agencies. “We have been working in close cooperation with BrainChip and are pleased to have verified the interoperability of our products,” noted Wayne Arvidson, Vice President, Surveillance and Security Solutions, Quantum, “The combined Quantum and BrainChip solution delivers rapid forensic search with the economic benefits of multi-tiered storage.”

SecurityLink India ■ April 2018


product showcase

NICE Actimize Introduces ACTone The Market’s First AI-Enabled Financial Crime Investigation Management Platform Improving decision making and reduces investigation time for a single alert by up to 70 percent

N

ICE Actimize has released its new Actimize ACTone, an artificial intelligence-enabled investigation management system that serves as the next generation alert and case management platform for financial services organizations (FSOs). NICE Actimize’s ‘ACTone’ reduces investigation time for a single alert by up to 70 percent and improves analyst’s decision making. Leveraging the autonomous financial crime management (AFCM) approach and AI-driven automation, Actimize ACTone transforms financial crime investigations and compliance operations by introducing analytics and automation at every step of the financial crime detection, investigations and operations process. This powerful combination of features and technologies enables FSOs to deploy an intelligent virtual workforce (or robots) for collaboration with human investigators and enables a complete paradigm shift in tackling financial crime investigations. NICE Actimize’s ACTone provides a unified platform to manage alerts and cases from a wide ecosystem of financial crime solutions. With this approach, any financial crime system can be transformed by applying AI-enabled robotics and automation to its ecosystem. ‘ACTone’ refers to ‘one platform’ for any financial crime solution. Together with NICE Actimize’s autonomous financial crime management approach, they provide the key to better resource utilization, increased accuracy and productivity, and improved return on investment. Joe Friscia, President, NICE Actimize said, “This paradigm shift, as reflected in our release of the new ACTone investigation management system is another proof-point in our march towards bringing the vision of autonomous financial crime management to reality. ACTone seamlessly

merges technology and data to both improve productivity and to turn raw data into actionable intelligence. In an autonomous world, instead of machines assisting humans to complete work, humans will assist the machines. With financial criminals getting smarter every day, it’s time for us to do the same. This is why we are so committed to our vision of autonomous financial crime management which provides these benefits and more as we attack all aspects of financial crime.” Shirley W. Inscoe, Senior Analyst, Aite Group said, “As financial crime attempts continue to increase, financial institutions can be overwhelmed, and they cannot always increase staff to handle higher alert volumes. Using automation to gather data and perform some steps of the investigation will enable analysts to be more efficient and disposition more alerts daily without sacrificing work quality.” Key capabilities of the new Actimize ACTone investigation manager also include: ●● Entity Insights™: Discovers visual relationships across entities, as well as connections between alerts and entities, which serves to uncover risks and reveal deeper insights. ●● Virtual Workforce: Eliminates manual data gathering and significantly reduces operational costs and errors with easy-to-configure robotics process automation. ●● Entity Risk: Assigns a dynamic risk score to every entity using machine learning to help analysts better prioritize their efforts and make faster decisions. ●● Activity Center: Provides immediate notifications on changes to any case or work item, whether that action is taken by other analysts or robots, enabling unmatched collaboration. ●● Visual storytelling and modern user experience: Offers intuitive navigation with maximized real-estate utilization and graphical data representations which provide instant insights. Actimize ACTone Investigation Manager, based on the widest set of financial services organization real-life investigation scenarios in the market, will first be included in NICE Actimize’s suspicious activity monitoring (SAM) anti-money laundering solution announced recently, as well as within its enterprise fraud and financial markets compliance solutions. NICE Actimize’s recently announced autonomous financial crime management approach represents a massive shift in unifying and mitigating risk through targeted utilization of big data, advanced analytics everywhere, artificial intelligence and robotic process automation which in concert reduce reputational risk.

SecurityLink India ■ April 2018

95


product showcase

New Conekt™ Mobile Credentials/ Readers at ISC West Eliminates frustrations integrators are having with original phone-based systems

With its core compliant to the certified common criteria EAS5+ computer interface standard, Farpointe’s Conekt solution provides increased hardware cybersecurity to resist skimming, eavesdropping and replay attacks. With the U.S. Federal Trade Commission (FTC), among others, now holding the business community responsible for implementing good cybersecurity practices such security has become an increasingly important consideration. Leveraging the security industry association’s (SIA) open supervised device protocol (OSDP), Farpointe’s Conekt solution will interface easily with control panels or other security management systems, fostering inter-operability among security devices.

F

arpointe Data, the access control industry’s OEM for RFID credentials and readers, has recently announced that access control system manufacturers, integrators and dealers will be able to provide their customers with a mobile, smart phone application and hardware that provides free download, user's choice of smart phone or smart card, and distribution via existing or independent access control software. Multiple Conekt credentials can fit into a single smart phone wallet app. Installer adjustable read ranges can be more than 15 feet (4.5 m). The new Farpointe Conekt series provides extremely generous gross margins. “Our channel customers have been requesting a mobile, smart phone solution that eliminates so many of the frustrations that they have discovered with present smart phone apps and hardware,” announced Scott Lindley, General Manager, Farpointe Data, “Therefore, we have gone the extra mile to assure that our Conekt solution provides the easiest way to distribute credentials with features that include allowing the user to register only once and needing no other portal accounts or activation features. By removing these and additional information disclosures, we’ve also eliminated privacy concerns that have been slowing down adoption of this technology. “We feel this is the type of smart phone-based access control our channel and their customers have wanted,” continued Lindley, “With Conekt, there are no physical cards to order, ship or store, making credential distribution much easier and more profitable. With this app and products, we help our channel customers more straightforwardly enhance existing installations and gain a competitive advantage when bidding on new opportunities. Farpointe has added the features that installers and their end user customers have been wanting for smart phone based physical access control.” 96

S2 NetBox Online Cloud-based Access Control System Flexible, scalable subscription service minimizes upfront installation and maintenance costs

S

2 Security has recently released S2 NetBox Online, a cloud-based version of its S2 NetBox access control and event monitoring system. A flexible, scalable subscription service, S2 NetBox Online offers both a pure web interface and S2 Security’s popular S2 Magic Monitor unified interface. “Through the cloud, we are delivering multiple new solution options and services for S2 system owners,” said John L. Moss, CEO, S2 Security, “S2 NetBox Online allows our integrators and end users to benefit from the access control capabilities they expect from S2 NetBox products with the reduced footprint of cloud-based services.” With S2 NetBox Online, features such as cardholder management, event monitoring, threat level escalation and reporting are accessible from any web browser, no software installation is specifically required. S2 NetBox Online supports up to 64 portals and can connect to up to 32 S2 nodes installed at single or distributed sites. The system works with existing card readers and is easy to set up and manage. Sys-

SecurityLink India ■ April 2018


product showcase

tem information is stored in the cloud at highly secure data centers, which comply with regulatory and audit standards. As a cloud-based solution, S2 NetBox Online minimizes installation, maintenance and IT support-related expenses. S2 NetBox Online is also integrated with the S2 Mobile Security Professional app, which enables management and staff to operate the system from a mobile device. S2 Security Corporation is the leading developer of complete enterprise physical security solutions including access control, video surveillance, event monitoring, digital signage, live Internet sourced real-time data and information feeds, mobile applications and cloud-based services. S2 Security revolutionized access control with the introduction of web-based S2 NetBox® in 2002, and continues to transform user experiences with breakthrough technology and open solutions. S2 Security’s highly scalable, distributed architecture fits organizations of any size and grows with their needs. Easy to install and use, S2 Security solutions are supported by a responsive team with field experience, dedicated to providing exceptional service. S2 Security serves Fortune 500 corporations, education, healthcare, manufacturing and government customers worldwide.

EZVMS – Unicorn Unprecedented Powerful & Versatile All-inone VMS Server

U

NV Unicorn is an easy-to-deploy, scalable and reliable management platform integrated with management, store, decoding and transfer functions for IPC, NVR, encoder, decoder, network keyboard and cloud devices. Unicorn is suitable for video surveillance solutions with 200~1000 cameras. It offers an intelligent solution that improves efficiency and reduces cost. It provides smart functions such as intrusion detection, cross line detection, defocus detection, scene change, and people counting analyses. Unicorn supports the ONVIF open standard. It’s compatible with most major brands and IP cameras supported ONVIF standard. With the unique Ultra 265 deep compression

technology, the storage cost can be greatly reduced by 75% at most. What’s more, Unicorn supports 48 HDDs at most when 2-disk enclosures are attached. To guarantee the data integrity, the latest RAID system was introduced to Unicorn which supports almost all RAID modes in the market, for example, RAID 0, 1, 5, 6, 10, 50, 60.

Highlighted features

●● WAN solution: As the center of a distributed solution, Unicorn can manage the devices scattered in the internet and provide service like live view, video store, record playback and alarm notify. With the help of cloud service, one can gain access to the management center at anytime, anywhere. It is typically used for chained stores or construction sites which are connected through the Internet. ●● Master and slave architecture: Maximum 8 slave hosts can easily expand both the bandwidth and storage capacity of the system. The master host will take control of everything like throughput balancing, resource allocating and video stream transfer. It is especially designed for the project with large storage requirement. ●● Central backup: Unicorn supports scheduled record backup function. When real-time recording is not feasible through the internet during weak network connection, Unicorn can back up the record at any other time. The backup process is very smart and it can resume from the last breakpoint of record backup. ●● Hot standby: To ensure the system’s stability, the hotstandby device will coordinate with the working device frequently to synchronize data and configuration. If the working device is offline, the hot-standby device will take control of the working device immediately to guarantee the system’s usability. ●● IPSAN integration: Although the storage capability of Unicorn is very impressive, the management platform can integrate IPSAN to greatly expand the storage capacity which means having longer record time, more storage space and extra storage performance. ●● Incredible decoding ability: It is incredible that Unicorn can not only handle 16 channels of 2MP camera decoding by itself, but also deal with 112 channels of 2MP camera decoding at most by adding additional decode card. ●● TV wall: With the optional decode card, Unicorn can support up to 15 monitors. Multi-monitors TV wall can be used to various kinds of surveillance business i.e., live view, video splitting.

SecurityLink India ■ April 2018

97




National Roundup

Annual Subscription: 2000/- for 12 Issues (Courier/ Postage charges extra)

“Security Link India” payable at New Delhi dated__________

* Please subscribe through admin@securitylinkindia.com

WE ARE UPDATING OUR DATABASE For free listing in Database:

For

Advertisement Contact: editor@securitylinkindia.com

* Send your detail to admin@securitylinkindia.com

Security Link India, H-187/5 (1stFloor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New �elhi-11� �1�, IN�IA � �el: ��1 11 �������7 � �ele�a�: ��1 11 ��8�8�8� � �ebsite: www.securitylinkindia.com 100

SecurityLink India ■ April 2018




Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.