SECURING THE INTERNET OF THINGS (IoT) Living Safe in the Connected WORLD Cover Focus
Inside Look
Show Preview
Cyber Security – The Strength or Weakness of a Smart City
Predictions on Data Security & Cyber Attacks in 2018
Connectivity Takes Centre Stage at IoT Asia 2018
Download our new Tradecards Global App on iOS and Android to read the latest issue!
-�
..-�·
----
---,
'\�
HDCVl-loT enhances the efficiency of agricultural systems, once temperature & humidity exceeds a set threshold, the system can sound an alarm and trigger regulators, ensuring optimal production conditions.
---�
• Temperature & Humidity Camera: Video with real-time environmental info overlay enhances monitoring efficiency. • Gateway Camera: Connects wireless alarm devices and transmits alarm signal through coaxial cable to the XVR.
• Motion Eye Camera: Motion detection & embedded PIR combine with up to 4MP video for visual alarm verification. • HDCVl-loT Recorder: Provides centralized loT management with friendly UI and data reports. • Easy HDCVI system deployment without extra wiring- saving equipment and labor costs.
Recommended Models
DH-HAC-LC1220T-T H 2MP HDCVI Temperature and Humidity Camera
C(
�
® ® .!Cs
DH-HAC-LC1200SL-W 2MP HDCVI Gateway Camera
DH-HAC-ME1400B/ME1200B 4MP/2MP HDCVI MotionEye Camera
DHI-XVR7000-4KL HDCVI loT Recorder
DH-PFM871A-N1 HDCVI loT USB Dongle
ISD9DD1:2DOO
DAHUA TECHNOLOGY SINGAPORE PTE. LTD.
Add: 62 Ubi Road 1 #06-15 Oxley Biz Hub 2 Singapore 408734 E-mail: sales.sg@global.dahuatech.com
March / April 2018
In this issue 6 8 10
25
CALENDAR OF EVENTS
COVER FOCUS
EDITOR’S NOTE
Cyber Security – The Strength or Weakness of a Smart City
IN THE NEWS Updates from Asia & Beyond
31
APPLICATION STORIES SMART Parking, Perimeter Security & More
38
FUN FACTS How IoT Will Change the World
40
DIGITAL SMART NATION Identity Based Border Security, Security Management Solutions & More
52
54
62
FUN FACTS
FUN FACTS
The Future Impact of IoT
Securing the IoT
INSIDE LOOK Predictions on Data Security & Cyber Attacks in 2018
64
IN FOCUS Personal Protection & Public Safety Via Kaha’s IoT Based App
68
SECURITY FEATURES From Digital Crime Fighting to SMART Security & Securing the IoT
88
SHOW PREVIEW A Sneak Peak into IoT Asia 2018
2
Security Solutions Today • March / April 2018
91 POST SHOW REPORT Intersec 2018
March / April 2018
Contact PUBLISHER
Steven Ooi (steven.ooi@tradelinkmedia.com.sg) EDITOR
Melissa Teo (sst@tradelinkmedia.com.sg) GROUP MARKETING MANAGER
Eric Ooi (eric.ooi@tradelinkmedia.com.sg)
SECURING THE INTERNET OF THINGS (IoT) Living Safe in the Connected WORLD
MARKETING MANAGER
Felix Ooi (felix.ooi@tradelinkmedia.com.sg) SENIOR MARKETING EXECUTIVE
Racheal Chong (racheal.chong@tradelinkmedia.com.sg)
Cover Focus
Inside Look
Show Preview
Cyber Security – The Strength or Weakness of a Smart City
Predictions on Data Security & Cyber Attacks in 2018
Connectivity Takes Centre Stage at IoT Asia 2018
Download our new Tradecards Global App on iOS and Android to read the latest issue!
Photos/Vectors Credit: Pixabay.com / Freepik.com Designed by Fawzeeah Yamin
HEAD OF GRAPHIC DEPT/ ADVERTISEMENT CO-ORDINATOR
Fawzeeah Yamin (fawzeeah@tradelinkmedia.com.sg)
SECURITY SOLUTIONS TODAY
CIRCULATION
is published bi-monthly by Trade Link Media Pte Ltd (Co. Reg. No.: 199204277K) 101 Lorong 23, Geylang, #06-04, Prosper House, Singapore 388399 Tel: +65 6842 2580 Fax: +65 6842 2581 ISSN 2345-7104 (Print)
Yvonne Ooi (yvonne.ooi@tradelinkmedia.com.sg)
Printed in Singapore by KHL Printing Co Pte Ltd.
GRAPHIC DESIGNER
Siti Nur Aishah (siti@tradelinkmedia.com.sg)
ANNUAL SUBSCRIPTION: Surface Mail: Singapore
- S$45 (Reg No: M2-0108708-2 Incl. 7% GST)
The magazine is available free-of-charge to applicants in the security industry who meet the publication’s terms of control. For applicants who do not qualify for free subscription, copies will be made available, subject to the acceptance by the publisher, of a subscription fee which varies according to the country of residence of the potential subscriber in the manner shown on the right. The editor reserves the right to omit, amend or alter any press release submitted for publication. The publisher and the editor are unable to accept any liability for errors or omissions that may occur, although every effort had been taken to ensure that the contents are correct at the time of going to press. The editorial contents contributed by consultant editor, editor, interviewee and other contributors for this publication, do not, in any way, represent the views of or endorsed by the Publisher or the Management of Trade Link Media Pte Ltd. Thus, the Publisher or Management of Trade Link Media will not be accountable for any legal implications to any party or organisation. Views and opinions expressed or implied in this magazine are contributors’ and do not necessarily reflect those of Security Solutions Today and its staff. No portion of this publication may be reproduced in whole or in part without the written permission of the publisher.
4
Security Solutions Today • March / April 2018
Airmail: Malaysia/Brunei Asia Japan, Australia, New Zealand America/Europe Middle East
- S$90 - S$140 - S$170 - S$170 - S$170
ADVERTISING SALES OFFICES Head Office: Trade Link Media Pte Ltd (Co. Reg. No: 199204277K) 101 Lorong 23, Geylang, #06-04, Prosper House, Singapore 388399 Tel: +65 6842 2580 Fax: +65 6842 1523, 6846 8843, 6842 2581 Email (Mktg): info@tradelinkmedia.com.sg
China & Hong Kong
Japan:
Iris Yuen Room 1107G, Block A, Galaxy Century Building #3069 Cai Tian Road, Futian District Shenzhen China Tel : +86-138 0270 1367 sstchina86@gmail.com
T Asoshina/Shizuka Kondo Echo Japan Corporation Grande Maison, Rm 303, 2-2, Kudan-Kita,1-chome, Chiyoda-ku, Tokyo 102, Japan Tel: +81-3-32635065 Fax: +81-3-32342064
25 - 27 OCTOBER 2018
IMPACT CONVENTION CENTRE, BANGKOK
CONTACT US MR TJ TAN PROJECT MANAGER E: TJ.TAN@UBM.COM
MS ARIES KEE ASSISTANT SALES MANAGER E: ARIES.KEE@UBM.COM
MS RACHEL EATON BRAND MANAGER E: RACHEL.EATON@UBM.COM
CALENDER OF EVENTS
COMING SOON... MARCH
IoT Asia 2018
Date: 21 - 22 Mar 2018 Venue: Singapore Expo, Singapore Organiser: Singapore Industrial Automation Association (SIAA) & SingEx Exhibitions Telephone: +65 6403 2100 Website: www.internetofthingsasia.com Email: registration.iotasia@singex.com
ARPIL
ISC West 2018
Date: 11 - 13 April 2018 Venue: Sands Expo Center, Las Vegas, Nevada, USA Organiser: Reed Exhibitions Telephone: (203) 840 5602 Website: www.iscwest.com Email: inquiry@isc.reedexpo.com
Secutech 2018
June
Date: 25 - 27 Apr 2018 Venue: Taipei Nangang Exhibition Center, Taipei City, Taiwan Organiser: Messe Frankfurt Telephone: +886 2 8729 1099 Website: www.secutech. tw.messefrankfurt.com Email: as-pr@newera.messefrankfurt.com
IFSEC 2018
MAY - June
IFSEC Philippines 2018
Date: 30 May - 1 Jun 2018 Venue: SMX Convention Centre, Pasay City, Metro Manila, Philippines Organiser: UBM Website: www.ifsec.events/philippines
october
DECEMBER
Security China 2018
Date: 23 - 26 Oct 2018 Venue: China International Exhibition Centre (New Centre), Beijing, China Organiser: China Security and Protection Industry Association (CSPIA) Telephone: +86-10-68731701 Website: www.securitychina.com.cn Email: International@bizcspia.com
Counter Terror Asia 2018
IFSEC Southeast Asia 2018
Date: 25 - 27 Oct 2018 Venue: Impact Conventional Centre, Bangkok, Thailand Organiser: UBM Website: www.ifsecsea.com
66
Date: 19 - 21 June 2018 Venue: ExCel London, London, UK Organiser: UBM Telephone: +44 (0)20 7069 5000 Website: www.ifsec.events Email: ifseccustomerservice@ubm.com
SecuritySolutions SolutionsToday Today••March March//April April2018 2018 Security
Date: 4 - 5 Dec 2018 Venue: Marina Bay Sands, Singapore Organiser: Fireworks Trade Media Pte Ltd Telephone: (+65) 6100 9101 Website: www.counterterrorasia.com Email: sg@asiafireworks.com
Editor’s Note Dear esteemed readers,
In this issue, you will be exposed to all things digitalised, from the Internet of Everything to biometrics and SMART cities. We will focus on the challenges that SMART societies face in terms of safety and security due to the current connective state of societies that are moving towards digitalisation. The influx of security breaches in the form of ransomware and malware attacks in the last few months have clearly demonstrated that companies have to confront the issue of Cyber Security due to the fact that it does affect physical security. What happens on the cloud has consequences on the ground as well. There have been reports stating that hackers have accessed everything from private residences to banks and even power plants via the “holes” in connected devices such as SMART kettles and even unprotected CCTV cameras. While this is alarming, it is also an excellent opportunity for companies to look into hack proofing their products and solutions in
8
order to provide enhanced security. However, as hackers become more and more sophisticated, developers will have to follow suit. Yes, the era of IoT has definitely dawned upon us, and what used to be an industry limited to CCTV cameras and perimeter defences has now evolved technologically speaking. Drones, security robots and video analytic software that can predict the occurrences of crimes through machine learning and complex algorithms are now trending in the security industry. Even the CCTV market has been touched by IoT related innovation with facial
recognition capabilities, connectivity and much more. In our Application Stories section, we provide a preview of the solutions being offered by industry innovators such as Gemalto with their research into digital solutions and Boon Edam’s efforts to secure data centres on a physical as well as cyber safe level. We will also take a look at companies like WAMA who are taking CCTV and surveillance to an elevated level with data analytics capabilities and more. Our Inside Look will focus on the connection between data breaches and customer loyalty in the industry.
Security Solutions Today • March / April 2018
In this issue’s edition of In Focus, we sit down with KaHa, an innovative Singapore based company that is already making waves overseas due to their IoT solutions that address the real world issues one faces living in today’s SMART societies. With public safety playing a major role in their solutions, KaHa has developed an application that is currently used in watches but can be applied further in an endless amount of ways. Adding function to fashion, the app provides safety measures for the SMART user such as the ability to send out SOS messages discretely with the press of a button and many more. We discuss the benefits and impact of their app in securing smart cities. Could it be that in our efforts to improve our quality of life that we are indirectly risking our lives as well? I certainly hope that you will enjoy this informative issue just as much as I have enjoyed curating it for your reading pleasure. 2017 was the year in which the Security industry was made to re-examine many of its issues due to the deluge of digital warfare that was imposed by hackers and other cyber criminals. Having said this, it is without a doubt that 2018 will be the year where we can look forward to all things innovative. Having said this, we hope to see you at one of the year’s most exciting shows – IoT Asia 2018. For more information on the event, do refer to our show preview. We look forward to bringing you the latest and greatest developments in the exciting world of security as it enters its digitalised future so do enjoy this issue and look out for our next.
Melissa T Editor
Globe vector/Icons by Freepik.com
W
elcome to yet another issue of what is proving to be a truly innovative 2018! We would like to thank our readers for their continued support throughout the years and we certainly look forward to bringing you thought provoking and timely industry updates in the months ahead. On this note, we would like to welcome you to the age of the Internet of Everything. We are currently living in an era where the world is on WIFI and connected devices are every and anywhere that one can possibly fathom. Technology is developing rapidly at the speed of light thanks to new developments in the fields of Artificial Intelligence, Biometrics, Sensors, SMART tech and much more. As such this is also an interesting time for the security industry, not only due to the technological advances but also due to the importance of safeguarding both people and property in this IoT society of today.
IN THE NEWS | AROUND THE WORLD
D-Link Wi-Fi Router Powered by McAfee Will Automatically Protect Connected Home Devices D-Link AC2600 Wi-Fi Router Powered by McAfee and Intel’s Connected Home Technology Combines High-Performance Networking, Instant Protection and Easy Setup
L
as Vegas, Nevada, USA D-Link and McAfee today announced the D-Link AC2600 Wi-Fi Router Powered by McAfee (DIR-2680), an all-inone solution that automatically increases security for devices on the home network and delivers on both companies’ vision to address the pressing need for online security as people’s lives become increasingly connected. The comprehensive solution includes D-Link’s highperformance dual-band 802.11ac router with MU-MIMO technology that enhances network capacity and efficiency for users, McAfee Secure Home Platform that automatically protects all devices connected to the network, and the Intel® Home Wi-Fi Chipset WAV500 Series to deliver robust Wi-Fi connectivity to numerous connected devices at the same time, running a range of highbandwidth applications. The number of connected devices in the home has skyrocketed – from tablets and gaming consoles, to IP surveillance cameras, smart door locks, and more. By 2020, Gartner estimates there will be 20 billion connected things, and their role and influence is set to dramatically increase over the next 10 years1. They’ve also raised a new crop of security issues, as Internet of Things (IoT) devices are subject to attacks just like any other connected device like a PC or smartphone. The new D-Link AC2600 Wi-Fi Router Powered by McAfee immediately and automatically helps secure all connected devices at the network level in a home, including nondisplay IoT devices, providing an additional layer of protection from potential hackers and for
10
members of the home using devices and accessing online content. “We’re on the forefront of preventing and fighting cybercrime as consumers need to feel safe and protected as cyber threats continue to rise,” said John Giamatteo, executive vice president, consumer business group, McAfee. “Our partnership with D-Link helps consumers benefit from both increased connectivity and peace of mind knowing that their connected devices are protected.” McAfee’s Global Threat Intelligence features adaptable machine learning that protects by preventing, detecting, and correcting malicious malware and attacks, which enables a safer internet browsing experience for consumers. Designed for families and smart home owners looking for the ultimate home networking without sacrificing privacy and security, the DIR-2680 keeps connected devices safer from unwanted intrusions and thefts. Additionally, comprehensive parental control features provide customized protection for children in the household. The DIR-2680 is easily set up with the D-Link WiFi app and can be managed from anywhere with the McAfee Secure Home Platform app. “As the number of connected devices
Security Solutions Today • March / April 2018
in homes increases, consumers are increasingly concerned about online security threats. D-Link teamed up with McAfee and Intel to address these concerns with a powerful, easy to manage, all-in-one solution,” said Anny Wei, D-Link president and CEO. “The new AC2600 WiFi Router Powered by McAfee is our solution for consumers to help protect their homes and children from evolving online threats.” “As consumers bring more devices and connected activities into their homes, they expect reliable, secure connectivity,” said Dan Artusi, vice president and general manager, Connected Home Division, Intel. “We are working closely with industry leaders like D-Link to develop solutions that make home networks faster, smarter and more secure to ultimately enable new immersive smart home experiences.” sst
IN THE NEWS | AROUND THE WORLD
AI and Digital Assistants to Surge in 2018, IHS Markit Says
L
ondon, UK – As they become more ubiquitous in homes and in various consumer electronics products, artificial intelligence (AI) and digital assistants are likely to be two of the major overarching themes at next week’s 2018 Consumer Electronics Show (CES). Accelerating growth in both of these markets underscores their surging role in the overall consumer electronics landscape. More than 5 billion consumer devices supporting digital assistants will be in use in 2018, with almost 3 billion more added by 2021, according to IHS Markit (Nasdaq: INFO), a world leader in critical information, analytics and solutions.
Smart Home Security
Despite this growth, there are still some hurdles to overcome, before consumer adoption is widespread. “Amazon has a clear lead over rivals Google, Apple and Samsung, in terms of the numbers of skills and thirdparty apps and services supported by its Echo products, but more needs to be done by all platforms,
Video surveillance will continue to be a critical component of the smart home in 2018, with video cameras and video doorbells representing nearly 20 percent of devices shipped into the smart home globally this year. As such, video surveillance will become even more intelligent, by pairing noise classifications,
to help users discover new skills and uses for the technology,” said Jack Kent, director, operators and mobile media, IHS Markit. “Major technology companies continue to make investments and acquire companies that increase AI expertise. Apple has been the most acquisitive to date, but Google has been the most active investor in third-party AI-centric companies.” Following are more key points to bear in mind about AI and digital assistants, as leading technology companies converge on Las Vegas for next week’s conference:
voice and facial recognition, and allowing consumers to filter what is most important in their daily lives. Moreover, there will be more allin-one devices launched in 2018, which will combine smart speakers, video cameras and hubs connecting all devices in the home. “As smart home players look to differentiate themselves and grow market share, smart home products will achieve more proprietary expansions through acquisition and in-house research and development,” said Blake Kozak, principal analyst, smart home and security, IHS Markit, “These deals will likely enhance the opportunities for AI and home automation. For example, although Amazon and Google will continue to ramp up partnerships, Amazon will direct its focus on developing equipment in-house, while Google will revamp relations with Nest.”
Smart Speakers With heavyweights Google and Amazon aggressively ramping up
continue on page 14
12
Security Solutions Today • March / April 2018
“Asia’s Premier Counter-Terrorism and Internal Security Exhibition and Conference!”
4 - 5 DECEMBER 2018 Marina Bay Sands, Singapore www.counterterrorasia.com For more info, contact us: (+65) 6100 9101
Organized by:
Fireworks Trade Media Pte Ltd
Co-Located With:
An International Conference on Counter-Terrorism and Internal Security
IN THE NEWS | AROUND THE WORLD
competition in the space, smart speakers have risen in prominence over the last year, as both standalone products and voice-based interfaces to the smart home. In fact, 39 million smart speakers are forecast to be shipped globally in 2018, up sharply from 27 million units shipped in 2017 “The smart speaker surge is only just beginning,” said Paul Erickson, senior analyst at IHS Markit. “2018 is the year competition in this market truly begins – and the year true mainstream adoption
accelerates. We expect numerous third-party smart speakers built around one or more digital assistants, so consumers will have more choices, when it comes to price, form factors, style, and audio quality.”
Smart Appliances “The integration of voice-assistant technology will soon move beyond major white-goods home appliances, to small appliances
and personal and hygiene-care appliances,” said Dinesh Kithany, principal analyst, smart home and appliances, IHS Markit. “We even expect some appliance makers to embed microphones in their premium appliances, complementing smart speakers in digital assistants within the smart home,” Kithany said. “How these companies might choose to use the data generated out of this user experience will be an interesting development to watch.” sst
JCB to Test Multipurpose Biometric Authentication For potential launch of authentication and payment scheme using visible light palm authentication
J
CB Co., Ltd., announced that JCB will be running a trial of multipurpose server-based visible light palm authentication in February at JCB headquarters in Tokyo, Japan, in collaboration with Universal Robot Co., Ltd. (UR), and the National Institute of Advanced Industrial Science and Technology. The trial will use UR’s visible light palm authentication, using both palm print and vein patterns, which has the world’s highest level of accuracy at only 1 in 100 billion false acceptance rate. The trial will focus on testing technical aspects during the registration and payment flow: capturing customer palm print and vein patterns with a smartphone camera, storing the patterns on a server, performing authentication, and returning the results to the smartphone. JCB will be studying how to utilise the authentication technology for a wide variety of services while only requiring the customer to register their palm information in the authentication server once using their own smartphone.
About visible light palm authentication In contrast to the palm vein technology using nearinfrared light currently in general use, Universal Robot has made it possible to capture vein patterns with
14
Security Solutions Today • March / April 2018
visible light for authentication purposes. This means that authentication can be done with just a smartphone camera. In addition, the technology is highly accurate, with only a 0.0003% possibility of misidentification. Universal Robot has patented the technology in Japan, the USA, and other countries. The visible light palm authentication used in this trial actually combines palm vein pattern authentication with palm print search of the data base to find the person’s information. This technology boasts the world’s highest level of accuracy due to the combination of palm vein pattern and palm print identification. sst
IN THE NEWS | AROUND THE WORLD
Turing Video and Segway Robotics Introduce Intelligent, Affordable Security Robot NIMBO
L
as Vegas, Nevada, USA - Turing Video unveils its new intelligent security robot, Nimbo, at CES 2018. Nimbo leverages the proven Segway Robotics’ mobility platform and is created with cuttingedge A.I. capabilities, making it intelligent as well as affordable. As its name would suggest, the robot is nimble - quick and agile, both physically and mentally. Nimbo can be pre-programmed to patrol specific routes or self-optimized routes while analyzing human activities and surrounding environments in real time. It is designed to detect security violations or anomalies and approach the area with light/audio/ video warnings that correspond to the situation. It collects HD video evidence and pushes notifications to security personnel including live video streaming to mobile devices. It also supports twoway audio, 24/7 continuous video history and auto charging stations. Nimbo’s unique mobility platform is powered by Segway Robotics, which is backed by Intel and Xiaomi. With industry-leading sensors on board, such as Intel RealSense, the base provides stability and flexibility for indoor and outdoor use. It can handle rough or uneven pavement and move over speed bumps, while the relatively small size (30inch height and 25-inch width) enables it to fit in narrow spaces. Additionally, the robot can be switched to the “Ride-On Mode”, a distinctive feature that allows a security staff member to step on and ride it up to 11 mph. Nimbo can patrol large company campuses, industrial warehouses, high-rise parking structures or parking lots, etc. Depending on application scenarios, it can be tailor-made to meet specific needs, e.g. communicating with drones, integrating with security management systems, adding extra sensors or readers. The extraordinary customizability is empowered by Segway platform that grants access to its vision, speech, locomotion, connectivity, interactive and other hardware extension. sst
16
Security Solutions Today • March / April 2018
No. 1 Tradeshow for Building, Electrical Engineering and Security Industries
Featuring
9-11 MAY 2018 Hong Kong Convention & Exhibition Centre
500 Top International Brands
Get First-hand Experience
Art Chain (Asia) Co Ltd, AUB Ltd, Ever Cool
Intelligent Building Solution, Indoor Air
Professional conferences on Climate
Refrigerating & Air Conditioning Co Ltd,
Quality System, Water Treatment
Change, Security Trends, Architectural
GELEC (HK) Ltd, Kwong Man Kee
Solutions, Total Surveillance System, etc.
Design & Idea-sharing networking events
Discover Future Trends
etc.
Engineering Ltd – Flowcrete, Lutron Gl Ltd, Sonic Guard Technology Company Ltd etc.
Register Now!
www.Build4Asia.com/enroll
Organiser: UBM HKES +852 2827 6211 visit@build4asia.com
follow us
Build4Asia
IN THE NEWS | EYE ON ASIA
Honda Partners with SenseTime to Accelerate R&D of Smart AI Cars with Autonomous Driving
B
eijing, China SenseTime, China’s leading artificial intelligence (AI) company, announced today that they have signed a long-term development agreement with Japanese car manufacturer Honda to build smart AI cars with autonomous driving. The partnership will leverage Honda’s vehicle control system with SenseTime’s AI algorithms to jointly create an autonomous driving solution. The two companies also announced that they will work together to develop robot technology. Rooted in computer vision technologies, these autonomous
“Rooted in computer vision technologies, these autonomous driving solutions can be deployed even in the absence of high-resolution maps, allowing them to cover an even wider array of driving conditions. When a vehicle is driving without a detailed map covering its trajectory, for example, it will still be able to use the selfdriving function. This autonomous driving solution offers great advantages to a variety of passenger vehicle scenarios and will also lower transducer manufacturing costs.”
18
driving solutions can be deployed even in the absence of highresolution maps, allowing them to cover an even wider array of driving conditions. When a vehicle is driving without a detailed map covering its trajectory, for example, it will still be able to use the selfdriving function. This autonomous driving solution offers great advantages to a variety of passenger vehicle scenarios and will also lower transducer manufacturing costs.
priority when it comes to driving, and it also constitutes the core of our autonomous driving solution. By combining SenseTime’s strengths in computer vision technologies with Honda’s superior vehicle control technologies, we will together enable a safe and pleasant autonomous driving experience. Moreover, the fact that SenseTime provides core technology to a global enterprise like Honda marks a milestone.”
new, extremely high standards on AI algorithms and development platforms as it requires extraordinary technologies to deliver such a solution. SenseTime, with a set of core technologies and patents for autonomous driving, has also developed chips and embedded systems for smart AI cars. The partnership between SenseTime and Honda is expected to accelerate the research and development of smart AI cars with autonomous driving solutions.
SenseTime Japan CEO Lao Shihong said, “Safety is the number one
A fast up-and-coming field, autonomous driving is levying
For more information, please visit: www.sensetime.com sst
Security Solutions Today • March / April 2018
The international exhibition & conference on building maintenance and facilities management
.... � 12�11./ SEPTEMBER 201B
......
�
�� 1
��
�!
m
'H4j,L S·6, IMPJ.lCT, BJ.lNGKOK, THJ.l/LJ.lND
TEDFM
OFTHEFUTU
llli!i!ili!i] @:UIDEfilElWiIDmllm��{l!)] ....... , ..._._.....�",AJ
ffflffiIB�C!fltliiim!lilfiillmm]�tln .
I II II1111 I II I I II 11111
• •
(ID[ilB
. �
=== == =
Ill 11111 Ill I I Ill= 11111 1 1 ::
11 I I Ill : I I Ill I 11111
Scan to book your booth
FM Products & Services I Plant Maintenance I Facilities Management Software Workspace Management I Smart Building Solutions I Cleaning Products & Services Security I Interior & Landscape Design I Green Building Technologies I Health & Safety Organized by
11\'I;!!.�!:!
@
www.bmamexpoasia.com
OG
BMAM Expo Asia
Q
I
+66 (0) 2833 5208
IN THE NEWS | EYE ON ASIA
New Security Solution from Tuya Smart Empowers Video Surveillance Manufactures with Easy Access to Echo Show
H
angzhou, ChinaAs a strategic partner of Amazon and the world’s first platform that is compatible with Amazon’s Alexa, Tuya Smart announce today the launch of its new “Echo Show accessible” smart camera platform, the world’s first platform that is accessible to Amazon’s Echo Show. Following Amazon’s release of the Echo Show and its access function to smart cameras, Tuya Smart’s camera team has taken large strides in the development of this new security solution, allowing camera manufacturers with low R&D abilities an easy access to Echo Show.
Echo Show - Visually Control Your Smart Home After Siri has introduced the smart voice assistant, Amazon has been attempting to expand this concept into our homes through Echo. With Echo, people can control smart devices, play music and shop online via voice, an idea also pursued by Google and Apple. This June, Amazon has introduced a new product named Echo Show. It is equipped with a 7-inch screen, designed around Amazon’s voice assistant Alexa, and aims to enhance the perception and visual performance while strengthening the Echo device’s communication ability with other devices. Between physical control and smart phone “app” control, people are increasingly preferring to control their smart devices with voice and visual interaction, therefore making this newly released product popular in North America and Europe.
Many Echo customers have remained loyal and bought the new Echo Show after experiencing the smart voice control with Alexa. European and American markets contain a greater number of “smart homes”, in effect, causing greater demands and expectations for visual interaction products. Echo Show has video camera access capabilities, and the video cameras compatible with this function are twice as expensive as normal smart cameras. Users can integrate video cameras around their house to the Amazon Echo Show. For example, by simply saying “Alexa, show me the front door”, or “Alexa, show me the baby room”, the user can see the live images captured by cameras through Echo Show.
Seizing the Potential in Smart Camera Market Currently, there are only a few video camera models which are compatible with Echo Show globally. A normal smart camera is priced at about 60 dollars, but with the function of access to Echo Show, most of these cameras are over 200 dollars. However still, customers are not detracted by the price tag and still willing to pay for such products. Seeing the potential in this market, camera manufacturers all over the
world are diving into the research and development of this field. The access to Echo Show requires excellent hardware performance, a mature cloud service system and vast experience in Alexa development. Unfortunately, there are only a few products that have met such requirements and this field is still relatively undeveloped in China. With access to Tuya Smart’s platform, camera products can also gain access to Echo Show within a few days, which will greatly strengthen their competitiveness in overseas markets. This is particularly helpful to the camera manufacturers with low R&D abilities. Firstly, the Tuya platform is charged in a onetime, lifelong, platform-based and transparent manner, therefore the manufacturers need not invest ten to one hundred times the funds originally required on technology development. continue on page 21
20
Security Solutions Today • March / April 2018
EYE ON ASIA | IN THE NEWS
Secondly, manufacturers can quickly release the finished smart cameras with access to Echo Show and greatly shorten the development period. With low investment costs, short R&D cycle and excellent compatibility, smart cameras with access to Tuya Smart Platform will become highly competitive products. Different development solutions
can meet the requirements of different manufacturers. Tuya Smart supports a variety of products: normal cameras; PTZ cameras; visual doorbells; lowpower camera; baby monitors; and offers complete cloud solutions. Basic cloud services: a solution for the complete P2P services (including P2P forwarding) and improved user account system, OTA upgrade hosting, and visual management of operating background systems.
Alibaba Cloud + Amazon-based video cloud storage service: a solution with military-grade security encryption technology, to effectively ensure data security and make life easier for enterprises and consumers. Tuya Smart will continue expanding cloud third-party services, Echo Show, Google Home, IFTTT, and other integrated services, making IPC more scalable. sst
YITU Technology Opens First International Office in Singapore
S
ingapore- YITU Technology (YITU), a leading pioneer in Artificial Intelligence (AI) research and innovation, officially launched its first international office in Singapore today. The new office will serve as a regional hub for YITU to bring its award-winning AI and facial recognition solutions to customers and partners in Southeast Asia, Hong Kong, Macau and Oceania markets, as well as serve as a platform for the company to work with private and public organisations in the region looking to deploy intelligent solutions for the digital age. “We see immense potential in Singapore as a market for AI development and innovation, and a springboard to introduce our cutting-edge solutions to the region,” said Lin Chenxi, Co-Founder of YITU. “The market sees a thriving deep tech ecosystem, and we recognise the opportunity for us to contribute to the growth of the ecosystem with our in-depth capabilities in AI, as well as showcase the limitless possibilities our technologies can bring to build a smarter, better future in Asia and beyond.” The opening was officiated by Guest-of-Honour, Ang Chin Tah, Director of Infocommunications and Media
from the Singapore Economic Development Board (EDB). The Guest-of-Honour and guests were also introduced to YITU’s breadth of AI solutions, which gave them a first-hand look at how YITU’s solutions are being applied across the financial services and public sectors. “We are delighted by YITU’s decision to establish its RHQ and R&D centre in Singapore. YITU’s strong capabilities in AI and computer vision make it a valuable addition to Singapore’s growing AI ecosystem. YITU will develop new solutions across different domains such as security, finance, healthcare, and transportation, in the process creating exciting new jobs in the AI sector,” said Ang.
Building a Smarter, Better Future for Asia with Artificial Intelligence Headed by Lance Wang, the General Manager of Southeast Asia, Hong Kong & Macau at YITU Technology, who previously worked at YITU’s headquarters in Shanghai, the Singapore office will serve as a sales, marketing and operations centre, with plans to establish a Research and Development (R&D) hub by end 2018. continue on page 22
March / April 2018 • Security Solutions Today
21
IN THE NEWS | EYE ON ASIA
The office will also focus on delivering AI solutions to the financial services and public sectors, with plans for expansion into other key verticals, including healthcare and transportation sectors in the region. “Singapore is a key financial hub in Asia, and the Government’s ambition in building a Smart Nation presents an opportunity for us to partner with both private and public organisations to deliver differentiated offerings that will contribute to the transformation of the city-state,” said Wang. “We also see potential in introducing our AI solutions to other markets in Asia, where digital transformation is happening at an accelerated pace. These are largely mobile-first markets, with extensive volume of data where AI can be deployed to enable faster, agile and more effective business decisions.”
Recognised Artificial Intelligence Pioneer Founded in 2012, YITU focuses on ground-up AI research and innovation for business use case scenarios. The company is focused on developing algorithms to ensure
high accuracy in its AI solutions for targeted industry offerings, especially in the financial services and public sectors. YITU’s facial recognition technology for ATMs has been deployed by China Merchants Bank and the Agricultural Bank of China, which enable face-authenticated cash withdrawals at ATMs without the use of a bank card. In addition, the company’s intelligent security platform has enabled organisations to implement state-of-art surveillance to enhance public safety and effect safer working environments. YITU’s facial recognition technologies have also been recognised by key industry bodies. In 2017, YITU was awarded first place in four categories at the Face Recognition Vendor Test (FRVT organised by National Institute of Standards and Technology (NIST). YITU also won first place in a face identification accuracy contest at the first Face Recognition Prize Challenge (FRPC or “the Challenge”) hosted by the Intelligence Advanced Research Projects Activity (IARPA) under the U.S. Office of the Director of National Intelligence. sst
Guangzhou Guangya Messe Frankfurt and Guangdong Public Security Protection Technology Association Join Forces to hold Guangzhou Public Security Technology 2018 Messe Frankfurt’s safety and security trade fairs elevate the show’s internationality.China’s safety and security industry sees a positive outlook
G
uangzhou, China Guangzhou Guangya Messe Frankfurt has announced a collaboration with Guangdong Public Security Protection Technology Association and will become the co-organiser for Guangzhou Public Security Technology (GPST). The 2018 edition will be held from 9 – 12 June at the China Import & Export Fair Complex in Guangzhou, China. The collaboration includes the support from Secutech, a worldrenowned safety and security trade fair brand owned by Messe Frankfurt.
Under the new arrangement, GPST 2018 is projected to draw more than 200 quality manufacturers and solution providers of safety and security technologies. Over 10,000 visitors representing the government’s public security department, systems integrators and research and development bodies are also expected to attend. GPST has been solely organised by Guangdong Public Security Protection Technology Association since 2004. With more than a decade of growth, the show has developed into an unparalleled industry event
for security and safety products and solutions in Southern China. The move can further benefit the show by bringing in a strong lineup of industry leaders and stakeholders, and will enhance the show into an international platform for product launching and sourcing.
Messe Frankfurt’s Safety and Security Trade Fairs Elevate the Show’s Internationality Guangzhou Guangya Messe Frankfurt is a subsidiary of Messe Frankfurt GmbH, one of the world’s leading trade fair organisers with continue on page 23
22
Security Solutions Today • March / April 2018
EYE ON ASIA | IN THE NEWS
its own exhibition grounds. Its safety and security trade fairs have gained a strong foothold in international major and emerging markets. These include the flagship trade fair Secutech in Taipei and its sister fairs in Bangkok, Ho Chi Minh City and Mumbai. On top of this, GPST is also held in conjunction with Guangzhou Electrical Building Technology, another industryrelated exhibition. The two shows benefit from a crossover of business opportunities for visitors and exhibitors alike. Mr Hubert Duh, Chairman, Guangzhou Guangya Messe Frankfurt Co Ltd and Chairman and Managing Director, Messe Frankfurt New Era Business Media Ltd, said the collaboration will bring new energy to the show and to both organising parties. He explained: “The move is an important step for the development of Messe Frankfurt’s safety and security trade fairs portfolio in Asia. The sector has been well established in global essential markets, and has now extended its presence in China. Together with the promotion of our industry leading a&s magazine series, we can strengthen the exposure in Asia, and especially in China.” Ms Jian Jie, Vice Secretary General of Guangdong Public Security Protection Technology Association, is also optimistic about the collaboration. She said: “GPST has always have a strong support from both the association and the government. The joining of Guangzhou Guangya Messe Frankfurt will further enhance the show’s internationality by their global resources in electrical
building, smart home and the Secutech brand shows. I am confident that the show will evolve into a multi-functional platform for import and export businesses, sourcing and advanced technology displays.” Running into its 11th edition, Guangzhou Public Security Technology 2018 will occupy 30,000 sqm of exhibition space (together with Guangzhou Electrical Building Technology). Five intelligent application zones will be set up to highlight the top vertical markets, including public safety, intelligent building, smart retail, smart factory and intelligent healthcare.
Safety and Security Industry Remains a Positive Outlook Set against the backdrop of rising global demands for safety and security products and rapid growth of IoT, local industry development in China is also catching up fast with more intelligent products. According to the Report of Market Prospective and Investment Strategy Planning on China Security Industry, published by,
the total value of China’s safety and security industry in 2016 was USD 84.3 billion (RMB 540 billion). Meanwhile, the market is projected to be worth USD 93.1 billion (RMB 595.8 billion) in 2017, up 10.3% compared to 2016. This growth is expected to continue at an average rate of 10% during the 13th FiveYear Plan period. During last year’s World Internet of Things Exposition, Mr Luo Wen, Deputy Minister of the Ministry of Industry and Information Technology of the People’s Republic of China, announced that the CAGR of China’s IoT industry has exceeded 25%. By 2020, the industry is anticipated to be worth more than USD 281.2 billion (RMB 1.8 trillion). Indeed, China’s safety and security enterprises are more competitive than ever in the global marketplace. As an industry-pioneering event, Guangzhou Public Security Technology is the connecting point for local solutions providers to the access the global market, and a melting pot for product presentation, business encounters and information sharing. sst
March / April 2018 • Security Solutions Today
23
IN THE NEWS | EYE ON ASIA
NEC Asia Pacific Successfully Completes 3 Safety and Security Trials With Singapore Government
S
ingapore - NEC Corporation and NEC Asia Pacific today announced the successful completion of three Safety and Security test-bed projects, held in and near Jurong Island, under the Safety and Security Industry Programme (SSIP) 2020. The SSIP 2020 is led by the Ministry of Home Affairs (MHA), Singapore Economic Development Board (EDB) and done in collaboration with JTC. The three trials were conducted over a period of 12 months from September 2016, and are aimed at using data analytics and security insights to address Singapore’s safety and security needs. The trials involved early detection of suspicious behaviour, off-site security clearance of authorised personnel and on-the-spot enrolment for firsttime visitor access to controlled areas. In the first trial, NEC provided and tested a system that utilised its high performance NeoFace® Facial Recognition software together with the Intelligent Complex Event Processing engine which correlates audio and video analytics, to detect suspicious behaviour and identify Persons of Interest (POIs) in both indoor and outdoor areas. The second trial facilitated off-site security clearance for entry of authorised personnel into Jurong Island, thus reducing congestion at the checkpoints. NEC provided and tested a Bus Sensors Monitoring Management System using customised tamper-proof security sensors to prevent unauthorised opening of vehicle doors during the bus journey. The third trial tested the feasibility of an automated system to provide a more efficient method of enrolling first-time visitors for entry into Jurong Island. The system leveraged NEC’s world-leading* biometric solution to expedite clearance of such visitors via onthe-spot facial and fingerprint recognition enrolment at the car inspection bays. For all the 3 trials, the technologies provided real-time
24
Security Solutions Today • March / April 2018
monitoring and alerts to the simulated Command Centre, to inform the authorities of activities which may require law enforcement action. As one of the world leaders in ICT and Public Safety solutions, NEC hopes to further collaborate with the government to address heightened security threats in the areas of critical infrastructure, border control and city surveillance for a safer and more secure Singapore. “Our safety and security agencies are continuously seeking to make use of new technologies and innovation to keep up with challenges and maintain our operational excellence. Testing innovative solutions through the SSIP provides a useful platform to do so, and we look forward to more collaboration with solutions providers to address safety and security challenges, and to serve the public better,” said Mr Ng Yeow Boon, Senior Director of MHA’s OpsTech Group. “JTC is always on the lookout for new solutions to ensure a safer environment in our industrial space. A key example is how we achieved better security operations by improving biometric access control at Jurong Island. We are pleased to support these latest efforts to testbed new security innovations,” said Heah Soon Poh, Assistant Chief Executive Officer, Engineering and Operations Group, JTC. “NEC is pleased to be part of the SSIP2020 initiative to utilise Singapore as a testbed to develop and deploy advanced next generation security solutions that can be scaled for use globally. We are committed to working closely with the authorities and corporations to create a safer and more secure environment for citizens and communities,” said Lim Kok Quee, Managing Director and Deputy CEO (ASEAN Sub-Region) of NEC Asia Pacific. In June 2014, an NEC-led consortium completed the first phase of the Safe City Test Bed initiative at Orchard Road for the Ministry of Home Affairs and the Economic Development Board. sst
COVER FOCUS
– - The Strength or Weakness of a Smart City Living Safe in the Internet of Things
I
n recent years, technology has begun to play an essential role in daily lives. Our internetenabled gadgets from our phones to these days, even our kitchen appliances, have changed the way we work, play or even carry out daily chores. Digitalisation impacts almost everything from personal lives, education, health, business and trade, physical infrastructure, governance to national security. Information and communications technology has become indispensable to the modern life, we critically depend on information and communication infrastructure in governing our personal lives, our societies, conducting business and running critical infrastructure. Hence more governments are taking an interest in adopting “smart”
concepts, for management of energy, water, transportation, waste, surveillance and security. Smart cities have evolved from being a buzzword to reality as the market has morphed into its next stage. As more governments begin to adopt “smart” concepts, most find it challenging to keep pace with rapid changes in the digital world and the continued evolution of their service delivery models. The increased complexity of city’s systems, interdependencies, globally connected social, economic and political sub-systems have increased the vulnerability of a city’s security. The cyber threats get magnified as infinite supply of data becomes more integral to a wide array of operations.
The interface between urban growth, technology, infrastructure and capital requirement presents a unique set of opportunities and challenges to the implementation of Smart cities. The challenges cities face generates demand for investment in the physical, economic, institutional and social infrastructure. The report tries to highlight the various parameters of a smart city, existing security challenges and possible solutions. Today Cyberspace touches almost every part of our daily life. Be it through broadband networks, wireless signals, local networks or the massive grids that power our nation. The threat from cyber attacks, ransomware and malware is
March / April 2018 • Security Solutions Today
25
COVER FOCUS
not only apparent but also very worrisome. There cannot be a single solution to counter such threats. A good combination of Law, People, Process and Technology must be established and then an effort be made to harmonise the laws of various countries keeping in mind common security standards.
What is a SMART City? A smart city is an urbanised area where multiple sectors cooperate to achieve sustainable outcomes
26
through analysis of contextual realtime information shared among sector-specific information and operational technology systems.
Parameters of a SMART City Smart Energy which refers to the digital Management of Energy; Smart grids, Smart meters, Intelligent energy storage. This will become more common as cities embark on the path to digitalisation. Smart Buildings in terms of automated Intelligent Buildings
Security Solutions Today • March / April 2018
consisting of advanced H e a t i n g Ventilation and air conditioning systems (HVAC) and also Lighting Equipment Smart mobility in terms of intelligent mobility with advanced traffic management system (ATMS), Parking management and ITS-enabled transportation pricing system and what brings it all together is Smart Technology consisting of Seamless Connectivity; 4G connectivity, Super broadband and of course free Wi-Fi. Smart Infrastructure that is on the rise now includes the digital management of infrastructure via Sensor networks, Digital water and waste management. To further facilitate the public, there will be Smart Governance and Smart Education: Government-on-the-Go; e-Government, e-Education and
COVER FOCUS
Disaster management solutions. Added to this, smart healthcare via Intelligent healthcare; technology, use of e-health and m-health systems intelligent and connected medical devices. Smart Citizens will have access to being civic digital natives through the usage of green mobility options and Smart lifestyle choices. Of course the key to the continuous functioning of all the aforementioned would be Smart Security consisting of intelligent threat detection; surveillance, biometrics, simulation modeling and crime protection along with Advanced proactive antivirus protection.
“The interconnectivity of people, devices and organisations in today’s digital world, opens up new vulnerabilities meaning access points or back doors where the cyber criminals can get in. We have seen evidence of this in the form of Ransomware attacks in the previous years resulting in everything from the interruption of transport services to shut down of a power plant.”
The global smart city market is expected to reach US$1.565 trillion in 2020, with one-half of smart cities from North America and Europe. E-Services to citizens, such as e-Payments, e-Exchange, e-Sharing and so on will empower citizens with real-time access to personal data and related services.
Intelligence: the first and most important stage of security is surveillance and intelligence gathering. This calls for equipment such as CCTVs and Biometrics hardware and software to collect the essentials in its raw, unprocessed form. Secured network for transmission of data is important to ensure non- tempering of data.
Mobilising the Resources: There is human intervention in any security installation with physical security apparatus from perimeter protection to communication devices for personnel on the move. The effective mobilisation of people and equipment is crucial to the entire infrastructure of a steadfast and secured location.
Fundamental to the creation of smart cities is the generating, analysing and sharing of large quantities of data. The main aim of smart cities technologies is to make cities data-driven; allowing city systems and services to be responsive and act upon data in real-time.
Analysing Data collected: Analytics help digest, decode and make sense of the terabytes of information and data collected, by providing secured storage, analysis and forensic tools. Change from byte-sized to bite-sized for effective prevention against threats or reaction to a calamity and provide situational awareness.
The interconnectivity of people, devices and organisations in today’s digital world, opens up new vulnerabilities meaning access points or back doors where the cyber criminals can get in. We have seen evidence of this in the form of Ransomware attacks in the previous years resulting in everything from
March / April 2018 • Security Solutions Today
27
COVER FOCUS
“The interface between urban growth, technology, infrastructure and capital requirement presents a unique set of opportunities and challenges to the implementation of Smart cities. The challenges cities face generates demand for investment in the physical, economic, institutional and social infrastructure. The report tries to highlight the various parameters of a smart city, existing security challenges and possible solutions.”
the interruption of transport services to shut down of a power plant. The multiplying effect of today’s cybersecurity challenges presents an opaque universe of threats that often come from unexpected or unforeseen domains, which have an escalating effect. The emergence of IoT centric societies have forced us to confront the following issues and raised questions such as: Can the Smart City’s cybersecurity keep pace with the speed of digitalisation? The causes and effects of new product launches, mergers, acquisitions, market expansion and all in all, new technology. As a network of networks has made data accessible everywhere, any time, one vulnerable device can lead to other vulnerable devices and traditionally closed operating systems can be
28
accessed externally. This in turn leads to Cloud vulnerabilities and Big data – storage and server security issues. We also have to question if bandwidth consumption from billions of devices will put a strain on the spectrum of other wireless communications.
Cyber Attacks are Becoming Part and Parcel of SMART Living Effective cybersecurity is becoming increasingly complex to deliver. The traditional organisational perimeter is eroding due to the need for collaboration with external partners and businesses, the existing security defenses are coming under increasing pressure. Every day, their attacks become more sophisticated and harder to defeat. Because of this ongoing development, we cannot tell exactly
Security Solutions Today • March / April 2018
what kind of threats will emerge next year or in 10 years’ time. We can only say that these threats will be even more dangerous than those of today. We can also be certain that Cyber criminals are working on new techniques that as old sources of this threat fade, new sources will emerge to take their place. Despite this uncertainty in fact, because of it, we need to streamline the type of security controls needed for getting through the security of established organisations, accessing everything from IP to individual customer information because they are doing this so that they can cause damage, disrupt sensitive data and steal intellectual property.
Security Threats of SMART Cities Privacy is considered as a basic human right and is protected by national laws in different ways.
COVER FOCUS
Privacy concerns include the acceptable practices with regards to accessing and disclosing personal and sensitive information about a person. Sensitive information can relate to a number of personal facets such as any information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context. Smart city technologies capture data relating to all forms of privacy and drastically expand the volume, range and granularity of the data being generated about people and places. Privacy can be threatened and breached by a number of practices, which are normally treated as unacceptable, however are part of operations in a smart city eco system.
• • •
Surveillance: Watching, tracking, listening to or recording a person’s activities Aggregation: Combination of various aspects of data about a person to identify a trend or pattern of activities. Data leakage: lack of data protection policies can lead to
•
leakage or improper access of sensitive information Extended usage: use of data collected for period longer than stated or for purposes other than the stated purpose without the subject’s consent
Insecure Hardware: One of the major concerns about smart cities sensors in the equipment; buildings etc. are insecure and not tested thoroughly. Owing to lack of standardisation of IoT devices, the sensors are prone to hacking. Notorious individuals can hack the sensors and feed fake data, causing signal failures, system shutdowns etc. Larger Attack Surface: Smart city operations utilise complex, networked assembly of ICT infrastructure to manage various services. Any device that is connected to the network is vulnerable to being hacked; the number of potential entry points is multiplied in Smart Cities. By compromising a single device, it is possible to attack the entire system or network. The vulnerability of systems is worsened by a
number of issues including weak security and encryption; the use of insecure legacy systems and poor maintenance; cascade effects; and human error. Bandwidth consumption: Thousands of sensors, or actuators, trying to communicate to a single server will create a flood of data traffic, which can bring down the server. Additionally, most of the sensors use an unencrypted link to communicate, and hence, there are possibilities of security lapses. The bandwidth consumption from billions of devices will put a strain on the spectrum of other wireless communications, which also operate on the megahertz frequencies like radio, television, emergency services, etc. Application risk: Apps have accelerated the integration of mobile devices within our daily lives. From mapping apps, to social networking, to productivity tools, to games, apps have largely driven the smartphone revolution and have made it as significant and as far- reaching as it is today. While apps demonstrate utility that is seemingly bound only
March / April 2018 • Security Solutions Today
29
COVER FOCUS
“A simple software bug can have huge impact. As Smart Cities will run on hundreds of systems and devices managing critical services, a simple software bug can have huge impact. For instance November 2013 Bay Area Rapid Transit (BART): major software glitch, service was shut down by a technical problem involving track switching, it affected 19 trains with about 500 to 1,000 passengers on board.” by developer imagination, it also increases the risk of supporting Bring Your Own device (BYOD) in a corporate environment. As the organisation enables employees to bring their own devices, the need for using the same devices to access work-related data inevitably presents itself. This presents mainly two security risks mainly malicious apps (malware), the increase in the number of apps on the device increases the likelihood that some may contain malicious code or security holes and App vulnerabilities referring to the apps developed or deployed by the organisation to enable access to corporate data may contain security weaknesses.
Simple Bugs with Huge Impact: a simple software bug can have huge impact. As Smart Cities will run on hundreds of systems and devices managing critical services, a simple software bug can have huge impact. For instance November 2013 Bay Area Rapid Transit (BART): major software glitch, service was shut down by a technical problem involving track switching, it affected 19 trains with about 500 to 1,000 passengers on board.
SMART Solutions SMART Society
for
the
Smart city technologies have large attack surfaces that have a number of vulnerabilities, especially in systems that contain legacy components
using old software, which has not been regularly patched.
Security as a Cost to Security as a Plus Security is usually positioned as an obligatory cost — a cost to pay to be compliant, or a cost to pay to reduce risk. But moving to a model of security as risk and trust management implies looking upon security as an enabler; for example, managing public data access leverages the monetary value of the data instead of focusing on the protection of the data itself. This transformation means enabling the development of even more extended networks of networks, of more and new forms of collaboration and mobility, and of new business models. “Security as a plus” should be a mainstay of the business.
Continually Learn and Evolve Nothing is static, not the criminals, not the eco system or any part of its operating environment — therefore the cycle of continual improvement remains. Become a learning organisation: study data (including forensics), maintain and explore new collaborative relationships, refresh the strategy regularly and evolve cybersecurity capabilities.
Disaster Recovery and BackUp Services Data centres, either on site or off site, are at the heart of smart cities. Disaster recovery is a critical part of the data Centre’s architecture. If servers go down, is it important that systems are brought back online as soon as possible and, once those systems are back up and running, need to have all their previous workloads operational. It is important to identify the right level of back-up required for various services. Data back-ups should be done regularly, and according to the best practices, should be done off site. This helps in data protection in case of physical security breach at the data Centre. sst
30
Security Solutions Today • March / April 2018
APPLICATION STORIES
Dahua Technology Seeing the Relevance of OWASP Top 10 to Security Industry
T
he Open Web Application Security Project (OWASP), a worldwide not-for-profit charitable organisation dedicated to improving the security of software, has released the latest 2017 OWASP Top 10 last month. This list, produced every four years since 2003 consists of the ten most critical web application security risks and is complied with the aim of keeping pace with the ever higher demands on cybersecurity and interconnected operating systems. The 2017 OWASP Top 10 list is based on the examination of over 2.3M vulnerabilities which have impacted 50,000 applications, and contains two large-scale vulnerability updates and updated attack scenarios. It serves as a standard guide of potential issues or all types of users, including those from the security industry since most video surveillance applications involve viewing of video over LAN/WAN using web browser while IP cameras and recorders have a web interface to initialise and configure the devices. Among the Top 10 risks on the list, most of the known cybersecurity problems in security products can be linked to 5 entries (A2, A3, A5, A6, A9), including Broken Authentication and Session Management, Sensitive Data Exposure, Broken Access Control, Security Misconfiguration and Using Components with Known Vulnerabilities. To cope with cybersecurity risks, Dahua Technology, the leading solution provider in the global video surveillance industry, is has already taken the following measures:
Strengthened Authentication and Access Control Almost every IP video device has authentication in place but weak or broken authentication can be exploited by attackers to gain control of the device. Likewise with Broken Access Control, where restrictions on what authenticated users are allowed to do are often not properly enforced. Attackers can exploit these flaws to access unauthorised functions and/or data, such as accessing other users’ accounts, viewing sensitive files, modifying other users’ data, change access rights and so on.
To strengthen authentication and access control, Dahua cybersecurity baseline has implemented the following measures. Firstly, a strong password consisting of 8-32 characters must be created. It automatically locks after multiple failed attempts. Secondly the IP address of log on clients is checked to see if they match with the session ID and can effectively filter requests not coming from the same client. In addition to that, idle sessions will be terminated to reduce risk
due to users forgetting to log out. Moreover, there is a built-in mechanism to defend against brute force cracking of the session ID value.
Guarding Sensitive Data Sensitive Data is being stored and transmitted to run the application, attacker will attempt to steal sensitive information such as passwords, payment information and IDs. Dahua cybersecurity baseline implemented the following to protect sensitive data First of all, Dahua supports HTTPS encryption and prohibits unencrypted transmission of commands involving sensitive data. Secondly, passwords stored in the device must be encrypted together with the device specific context to increase the difficulty to crack the encryption. Protect configuration data with encryption when stored, upload and download. Even authenticated users are not allowed to decode the data into clear text. Data integrity validation is conducted in both the upload and download process.
Changes Made to Reduce Misconfiguration According to OWASP, security misconfiguration is the issue most commonly seen. Dahua has analysed past misconfiguration issues and made the following changes to reduce exposure to potential attacker. To start with, all default accounts are removed. Installer must set up a customised password during continue on page 32
March / April 2018 • Security Solutions Today
31
APPLICATION STORIES
device initialisation. In addition all unused open ports are closed and an authentication mechanism is implemented to all remaining necessary open ports. Finally, Dahua has deployed cloud firmware upgrade feature to make it easier and more convenient for users to keep firmware up to date.
Human Efforts to Correct Human Errors It is only through the combined forces of humans and machines, of customers and manufacturers and all related parties, that we can we most effectively deal with cybersecurity problems. Dahua has put a great deal of effort ensure customers will be given proper information, access to fix software and technical support to deal with vulnerability effectively. On the official website, Dahua has posted its Best Practices, a page offering useful tips and recommendations in detail that help to build a more secure security
“Since video surveillance has become a core part of IoT, it’s not surprising that in recent years there have been an increasing amount of attacks targeting IP video devices. Thus Dahua has proposed to establish a new ecosystem of network security encompassing the end user, installers and manufacturers.” system. There is also a channel for Vulnerability Reporting, through which users and other related parties can share their clues on cybersecurity loopholes and these efforts will be rewarded after an assessment of the vulnerability. Since video surveillance has become a core part of IoT, it’s not surprising that in recent years there have been an increasing amount of attacks
targeting IP video devices. Thus Dahua has proposed to establish a new ecosystem of network security encompassing the end user, installers and manufacturers. In August 2017, Dahua shared a white paper regarding cybersecurity with its customers, and an updated version will be issued in early 2018. In conclusion, Dahua has been well prepared for the battle of cybersecurity through the identification of application risks, potential attackers and other threats. With well thought-out precautionary plans and carefully designed coping mechanisms, Dahua can respond to risks in a quick and effective manner and solve the problems before they really become problems in most cases. With a mission to enable a safer society and smarter living, Dahua will continue to focus on “Innovation, Quality, and Service” to serve its partners and customers around the world. For more information, please visit: www.dahuasecurity.com sst
Tusco Perimeter Security Protects Atlanta’s New Mercedes-Benz Stadium with Delta Scientific Vehicle Access Control Equipment Tusco Wins Associated Builders and Contractors (ABC) 2017 “Excellence in Construction Award” for Stadium’s Perimeter Protection System
D
elta Scientific, the leading manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, today announced that Atlanta’s new $1.5 billion stadium, home to the NFL Atlanta Falcons football team and MLS Atlanta United soccer club and site of the recent NCAA national college football championship, is protecting fans, personnel and athletes from terrorists and errant
drivers from using vehicles as weapons. Installed by Tusco (Cottondale, Ala.), using Delta Scientific perimeter protection products, the new access system includes four DSC501 barriers, five DSC720 bollards, 39 DSC2000 barriers and 59 DSC680 fixed bollards. “We are very experienced with installing Delta equipment,” relates Brent Martina, president, Tusco. continue on page 33
32
Security Solutions Today • March / April 2018
APPLICATION STORIES
“Mercedes-Benz Stadium was very particular about is 35 inches tall and 15 inches wide. At Mercedes-Benz their security needs and protocols and requested a Stadium, the bollards feature brushed stainless steel customized sequence of operations for their security sleeves. equipment. Delta Scientific’s products and experienced engineers made them the obvious choice in meeting At the loading docks, 39 of Delta’s fastest, smallest and both the high quality and technical standards required shallowest foundation barricades were implemented. to integrate with the stadium’s sophisticated security Chosen especially for high speed applications and ease system. It was crucial to of installation, the cost have a reliable team in effective DSC2000 barrier place as we received a very is K12 crash certified with “To strengthen authentication and compressed schedule to no penetration, meaning access control, Dahua cybersecurity get everything complete it will stop a 15,000 baseline has implemented the following by the first football game pound vehicle traveling measures. Firstly, a strong password and, therefore, had no 50 mph dead in its tracks. room for errors.” The ten-inch shallow consisting of 8-32 characters must be foundation also reduces created. It automatically locks after DSC501 barriers were installation complexity, multiple failed attempts. Secondly the IP used at main entrances time, materials and address of log on clients is checked to where players and VIPs, corresponding costs. see if they match with the session ID and among others, enter with can effectively filter requests not coming their cars. The DSC501 Lastly, 50 DSC680 shallow from the same client.” is the only K54-certified foundation fixed bollards retractable vehicle with stainless steel sleeves barricade in the world. Set protect pedestrian areas. in a foundation only 18 inches deep, it will survive and They secure any unprotected locations where vehicle operate after a 5.4-million foot pound impact. That’s bombers and errant drivers have no obstacles. The equivalent to a 65,000-pound truck hitting it at 50 system also includes Delta Scientific hydraulic power mph. Stopping the truck or car dead in its tracks, the units and features touchscreen controls. DSC501 protects against a “second hit” risk from a second vehicle. The stadium preferred installing these “Delayed by roof issues, the Mercedes-Benz Stadium barricades in a more industrial look, wanting them to challenged us with a condensed schedule to provide be “seen.” one of the world’s most secure vehicle access systems,” avows Martina. “I’m proud to say that our team Five retractable DSC720 bollards were used at the completed the work on time and walked away from the pedestrian entry areas. This is Delta’s highest crash rated project with another pleased client.” bollard, stopping a 15,000 pound vehicle at 50 mph. The bollard will stop and destroy much larger vehicles For more information, please visit: than those tested at very high velocities. The DSC720 www.deltascientific.com sst
March / April 2018 • Security Solutions Today
33
APPLICATION STORIES
WAMA Clarifies the Truth with New 4K UHD IP Cameras
T
he rise in terrorist and criminal activities around the world has caused the demand for high definition security cameras to grow by the day. High clarity surveillance videos are not only important legal evidences for post-incident investigations, with the aid of intelligent video analytics technology, they are also effective tools for crime prediction. In 2018, WAMA starts off the new year with the release of two new 4K IP cameras. These cameras come with multiple features including 4K ultra-high resolution, H.265 compression technology, triple independent video streams, region of interest (ROI) smart encoding, automatic network replenishment (ANR) and built-in video analytic functions. The 4K vandal resistant compact dome camera and bullet camera are suitable for indoor or outdoor applications that require high clarity videos and intelligent functions. “The security industry is moving very quickly with the emergence of many new technologies. 4K, H.265 and artificial intelligence are among the technologies that we anticipate will have a widespread use in the near future,” said Dr. Wallace Ma, CEO of WAMA Technology Ltd. “With the launch of the new NS8 series 4K IP cameras, we aim to bring security in the society to a higher level.”
4K Resolution The new cameras are capable of capturing videos at 3840 x 2160 pixels (8MP), which is four times the resolution of 1080p. The 4K imagery technology allows crystal-clear videos to be produced, ensuring all important details at the site of surveillance not to be missed.
H.265 Technology H.265 video compression technology can reduce the network traffic and storage requirement by 50% in comparison to H.264. By optimizing the network
bandwidth while maintaining the details of 4K resolution, the overall storage costs can be greatly minimized.
3 Independent Video Streams The cameras are also developed to simultaneously deliver 3 independent video streams to provide greater flexibility for users with different requirements: • Main stream with maximum 4K resolution at full frame rate • Sub stream with maximum D1 resolution at full frame rate • Third stream with maximum 4K resolution at 6fps Users can have the flexibility of choosing 2 streams with 4K resolution, or selecting different resolution for live viewing and video recording.
Region of Interest On top of the H.265 compression technology, the ‘region of interest’ encoding technology can further optimise network bandwidth and ultimately saves storage costs. A maximum of four regions can be pre-set as regions of focus, while redundant video data in areas that are not of importance will be omitted. This approach effectively compresses video data without the need of sacrificing image quality in the areas of interest.
Automatic Network Replenishment (ANR) The ANR technology ensures safe recording of videos even during a network breakdown. When network failure is detected, videos will be automatically recorded onto the camera’s micro SD card. When network is resumed, the videos will be stored back into the NVR.
Built-in Video Analytics The 4K IP cameras also come with four built-in video analytic functions including tripwire detection, continue on page 35
34
Security Solutions Today • March / April 2018
APPLICATION STORIES
“The security industry is moving very quickly with the emergence of many new technologies. 4K, H.265 and artificial intelligence are among the technologies that we anticipate will have a wide-spread use in the near future.” - Dr. Wallace Ma, CEO of WAMA Technology Ltd.
loitering detection, missing / unattended object detection and overcrowd monitoring. They are designed to intelligently analyze the captured videos at real-time. When abnormal events are detected, alarm notifications will be instantly sent to the operators, all without the need of human involvement.
• • • • • •
Features
• •
• •
Sony 1/2.5” 8MP CMOS sensor Triple streams (H.265 / H.264 / M-JPEG)
Built-in video analytic functions Motorized vari-focal lens Micro SD slot for recording Region of interest (ROI) Automatic network replenishment (ANR) Day/Night (ICR), T-WDR (120dB), 3DNR, AGC, defogging ONVIF (Profile S) Power over Ethernet (PoE)
For more details, please visit www.wamatech.co sst
March / April 2018 • Security Solutions Today
35
APPLICATION STORIES
Dallmeier Security Technology Protects Drivers and Goods at Euro Rastpark – Premium Parking Areas
I
n recent years, a particular form of criminality has become more widespread on Europe´s major highways: the theft of valuable commercial goods, vehicles and their cargoes and even the fuel tanks on lorries have been targeted by organised crime. The financial cost is enormous! So Euro Rastpark began working with other members of the Association of German Off-motorway Truck Stop Owners (VEDA) to combat the problems by developing a security concept that addressed actual conditions and now offers premium parking areas that are screened and monitored by Dallmeier security technology. Regensburg-based Euro Rastpark GmbH & Co. KG operates comfortably equipped rest stops for commercial drivers at 18 sites throughout Germany, many of which are located on important transport logistics routes. The rest areas represent a valuable addition to the regional infrastructure with thoughtful additions of service, eating, entertainment and shopping facilities, and in more and more cases with opportunities for inexpensive overnight accommodation. For professional drivers, these rest stops (Autohöfe) close to the motorway are important waystations where they can take their legally mandated breaks from driving.
A Target for Thieves In recent years, a particular form of criminality has become more widespread on Europe´s major highways: the theft of valuable commercial goods, vehicles and their cargoes. The financial cost is enormous: German insurers pay an average of a million euros per business day for lost commercial goods alone. On top of this, property damage must be considered, and no less important are the threat and uncertainty felt by many drivers. Even the fuel tanks on lorries have been
targeted by organised crime, and accordingly theft of fuel has become a regular cause of annoyance to drivers and hauliers alike. In recent times, the police have been called to investigate as many as nine criminal offences a week at the Theeßen Euro Rastpark on Eastern Europe Route A2. The company has recorded high crime rates elsewhere too. Respected logistics companies were even compelled to warn their driving personnel about less safe routes. The situation could not be allowed to continue, and Euro Rastpark began working with other members of the Association of German Off-motorway Truck Stop Owners (VEDA) to combat the problems by developing a security concept that addressed actual conditions.
The Solution: Premium Parking Areas Euro Rastpark now offers premium parking areas that are screened and monitored according to VEDA standards for lorries at seven of its truck stops. Their aim was to develop a security solution that could be implemented quickly and without prohibitive expense. Managing director Johannes Witt explains the concept: “We have not relied on expensive construction, but rather on pragmatic detection and deterrent measures such as restricted approach roads, the best possible lighting and complete documentation of all movements by vehicles and people.” For the full-coverage detection of all movements, they decided to use an economical and top-quality video observation solution offered by another Regensburg-based company, the technology pioneer Dallmeier. Accordingly, DF5200HD-DN/IR type high resolution infrared cameras have now been deployed to improve security on the approach and departure roads to the separate lorry parking areas at the Theeßen Euro Rastpark. The video system is set up so that the vehicle licence plates are clearly readable not only by day, but continue on page 37
36
Security Solutions Today • March / April 2018
APPLICATION STORIES
“The video system is set up so that the vehicle licence plates are clearly readable not only by day, but also in night recording mode. The video data is backed up reliably by the DMS 2400 Appliance, one of the most powerful recording solutions in Dallmeier’s inventory.”
also in night recording mode. The video data is backed up reliably by the DMS 2400 Appliance, one of the most powerful recording solutions in Dallmeier’s inventory. During the project to equip the premium parking area with video equipment, Euro Rastpark seized the opportunity and commissioned Dallmeier to install cameras for observing the refuelling lanes as well as the retail area and cash registers in the service station shop. In all, 24 camera systems are now operational
and between them they monitor all critical areas. The 96 lorry parking spaces at the Theeßen truck stop now constitute a further precinct of safety and calm within a zone that is fully protected by video technology.
Protection for Drivers and Goods The number of thefts of vehicles, goods and fuel from the secured parking area has fallen dramatically. These new security zones also mean that the drivers can work with more peace of mind, since they do not have to worry about the safety of their valuable cargoes, or even their personal safety on top of the normal cares of a demanding job. “Since we started this initiative, the number of robberies has fallen massively” confirms Witt. More protection and comfort for drivers, theft prevention for goods and operating equipment – video technology from Dallmeier ensures that the logistics chain does not break down on the roads and highways. For more information, please visit: www.dallmeier.com sst
March / April 2018 • Security Solutions Today
37
FUN FACTS | THE INTERNET OF EVERYTHING IS EVERYTHING
The Internet of Everything is Everything How IoT Will Change the World Who needs to hire help when there are apps? Have you ever wished you didn’t have to spend so much time drafting a grocery list or figure out what to co ok after a long day? Smart appliances are not only on the ma rket but are doing the most. Samsung’s Family Hub refrigerator does everyt hing from playing tunes to mana ging your grocery list. For those less than culinary inclined , there is even the Hello Egg by RnD64 which tells you what is in your refridgerator an d what you can cook from these ingred ients. Switch off your bra ins and turn on your apps will be the motto of the future.
cosystem
Cyber E e h t o t n ging i
wable
e ng ren i w o r G energy
stay ces to nd r u o s en ma to gre ter de s turn ill be a grea rtation e c i v e spo As d re w y. Tran ed, the ely power wable energ ly to be larg uld e e o for ren ace most lik ted homes c r. l c e p e is the d but conn d wind pow t r e n t a c r m a ola aS a imp n off s roposal for u r d l y l u i o w eas ap power d is also There place, where fficiently an uts e n e k i or lac o Grid uted m ly to have b nd b i r t s i rs a like be d e less Smart mete impact. b d l u an wo ts. o have ownou and br tats will als os therm
r life, you t is your ill become a h t b u h w l a centra Internet ook into our school, the h d n a t r y y, ma r countr ecome s evices b your world, you d e r o m nd and o have to r town, a e going t municate As more u r o a y y , e d h o t , m rho hen m. fficiently ays to co neighbo ecosyste d work e er and better w would happen w n n a a f n o io e t r t a fas mo ine what re inform ure out but imag es to sha nnected and fig y ic it v iv e t d c e e s onn rco y. f the ore inte ness is c agintion actuall For all o re and m key to seamless o im m h c e u m beco . The d for m another . No nee with one em gets hacked yst the ecos
Log
38
Security Solutions Today • March / April 2018
THE INTERNET OF EVERYTHING IS EVERYTHING | FUN FACTS
oud is
the cl ctually
lin! A l a f s i y The Sk ng! e cloud i d on th d e o d l a lo p p ex g is u me an g verythin an beco
ean e . Addin rnet c d I do m y that the Inte f cloud hosting basic n a g in h a o n’t a se Everyt s. The only w gh the u at all if there is in the u o y r a h d t these help tem is ck out t ecosys s isn’t going to and send it ba omplish this is efficien e c a t ic a the da to dev ay to c he IoT sensors ture to gather ge. The only w possible for t pps c a ’t u u n r g u n t is s yo r a infrast at and la cations. It jus d allow of when m u r o lo f c t e c li corre d app ause th e again think ud-base ud, bec with clo ithout the clo u go. Now onc ! w yo begin to work you wherever ta rain a d e h t w t to follo is hacked. Le d the clou
Shop till your Wifi sign
al drops
Instead of going to the local mom and pop sto re up the street, consumers will prefer megastores suc h as Walmart or Amazon. However, the IoT promises to change shopping even more. Have you ever go ne to the store for a spe cific item and found it out of stock? Wi th smarter devices and the ability to track inventory through an interconnected system , stores will be better able to predic t buying patterns and stock what is needed. This could poten tially drive down costs as well since there will be less waste .
curity
e t of ins e n r e t he in
Connec healthc ting to better are The nat ur healthc e of IoT is well are as it -suited to co data fro m devic llects and mon es, so it it that mo only ma ors re kes sens hospita and more doct e lw or to track ill utilise emer s and the ging tec vital sta hn tistics o f their p ology atients. Some h osp use sma itals have alre ad rt a patien beds to inform y begun to t leaves nurses w th can adju h st to the eir bed and also en position most co m fo of these r an individua fortable l patien devices t. Many ca work of overloa n help lessen t d he ed nurs healthc es. are enhance machines can Connecting a the qua lity of c lso prove to are give n.
ur that yo vity is eds will i t c e n n e the co s urity n s of all nd your sec t weaknesse e e g a t n a a u th v e o t d o g a a t v in the dis ing up ess pri f figur One of tion will be l ave a way o devices hook portant a im e sh inform er. Criminal ore and mor of the most re, Ddos a t e m a w n be gre stem. With o become o alware, Spy f could y t s M k g , y n n e ar thi o goi in an rity is es. Ransomw ack one can u c e s , att IoT r liv f cyber s of ou ill. aspect other form o to a standst this is y y t ty and cal i and an bring socie l i b i s n si ly t respo ill phy he possib es grea No longer w ment andd t m o c y . e t i c n e i v r s i o s e t f come onnec aw en reat th With c ber security ce as both l t the real th , it can and y a ffi c h u ined tt where measures s onfron is not conta c o t y t i d t r secu force nd if i will be pace a public sts in cybers lives. ly xi days e into our dai k a will le
T
From SMART cities to SMARTer nations All things will be automated for easy living. Will technology and data take over every aspect of our lives?. Imagine the world ten or twenty years from now. You’ll get out of your smart bed that measured your sleep patterns and adjusted pressure and incline to help you get a good night’s sleep. You’ll brush your teeth with your smart toothbrush that will send a report to your dentist and let you know if you have any cavities starting. You’ll go to your smart refrigerator and pull out the milk, and the fridge will add milk to your shopping list because it notices you are almost out. What a SMART life!
March / April 2018 • Security Solutions Today
39
DIGITAL SMART NATION
Avira SafeThings™ Reimagines Home Security in the IoT World, Without Adding Another Device in the House
T
ettnang, Germany - Avira, the German security developer behind the award-winning antivirus solution, announces the availability of its SafeThings™, a totally new approach to safeguard smart homes and the growing number of IoT devices. With nearly a decade of experience in artificial intelligence and machine learning, Avira has developed a gateway software solution for IoT devices that provides security and privacy without additional infrastructure, nor added complexity for the users.
Effective Solution that Just Works Avira SafeThings™ is a software application installed on routers that automatically secures the connected devices in the home, by using machine learning and artificial intelligence, in a friendly manner, with a compelling user interface. SafeThings™ is easily delivered via the router or the internet service providers and doesn’t require end users to act as the information security officers for their home.
continue on page 41
40
Security Solutions Today • March / April 2018
DIGITAL SMART NATION
“Avira SafeThings™ transforms routers into home protectors, supporting user privacy and placing IoT devices beyond the reach of hackers. SafeThings™ sits where the home meets the internet, within the home router. By identifying what goes in and out – and then using artificial intelligence to dynamically analyse their behavior – SafeThings™ can quickly identify intrusive or hijacked IoT device activity and stop it.”
“We know that people don’t want to buy yet another device and they certainly don’t want the headache that comes with installation,” said Travis Witteveen, CEO of Avira. “With Avira SafeThings™ we are strengthening our core competency, best in class AI-based detection. We know that users just want to enjoy the experience of the smart appliances, without leaving the couch, and while being safe. They expect security and privacy protection to just work. Together with our partners, the internet service providers and router manufacturers, we work to deliver IoT security and privacy to consumers, via their routers, in a highly effective and friendly way.” Avira SafeThings™ transforms routers into home protectors, supporting user privacy and placing IoT devices beyond the reach of hackers. SafeThings™ sits where the home meets the internet, within the home router. By identifying what goes in and out – and then using artificial intelligence to dynamically analyse their behavior – SafeThings™ can quickly identify intrusive or hijacked IoT device activity and stop it. It safeguards users’ connected devices against hijacking, ransomware, misuse and intrusion, while enabling owners to see and control how their connected devices handle data.
estimated total number of connected devices would hit 8.4 billion in 2017, a big jump of 31% from 2016. That count puts the number of these devices well over that of the 7.5 billion people inhabiting the Earth. Internet of Things benefits come with a tradeoff: the owners are virtually naked and exposed in their seethrough smart homes by providing nonstop, often unencrypted information about all their private actions choice of TV programs, CCTV videos of home activities, and even preferred thermostat settings. Fundamental principles of security are routinely ignored with IoT devices. They are often shipped with default or poorly generated default passwords, and no “change password at first use” policy. There’s extreme cases where no password is required to access devices or select services on those devices. Additionally, unnecessary ports are often left open at the factory.
IoT Became the Spying Neighbor Within the House
It is estimated that currently 70% of the IoT devices are vulnerable to hijacking. Attackers know this and exploit such vulnerabilities putting both the connected home and the network infrastructure at risk. The release of Mirai malware in October 2016 changed the landscape dramatically, proving that the smart devices can be enslaved into a botnet to distribute spam and malware or to steal private data for blackmailing.
The smart home has become a reality. The Internet of Things enables convenient manageability of a variety of devices - from electronics (phones, tablets, TV), to utilities (thermostats, lighting, energy trackers) and even appliances (connected washer / vacuum cleaners). According to the industry analyst firm Gartner, the
In real life, most people close the curtains or lock the door when they realize they are exposed. But with many connected smart homes, users don’t even realize that the spying neighbor next door now lives in their house. They might not know which of their household appliances – from light bulbs to washing machine – are tracking continue on page 42
March / April 2018 • Security Solutions Today
41
DIGITAL SMART NATION
the online and offline behavior. Even worse, they have no way to slam the door on these intruders, apart from unplugging the device.
Building a Secure Platform Avira SafeThings™ is a security platform, fusing several functions together as it secures the smart home, via four basic actions: 1.
2.
Watches – A software agent tags each device in the smart home and collects basic information about messages going in and out through the gateway. This info is like the sending and return address on a letter, Avira SafeThings™ is not getting into the private content. Thinks – SafeThings™ uses AI – such as machine & swarm intelligence – techniques to dynamically classify each device, determine normal behavior, and develop the advanced logic needed to set the rules for connected devices. It also learns and adapts to develop more accurate detection, by itself.
3.
Acts – When SafeThings™ AI detects unusual device activity, it has the agent enforce the rules. This shuts down the suspect activity without disturbing the device’s usual functions.
4.
Shares - The SafeThings™ user interface shows in a friendly manner what’s going on in the network. The user gets to know more about the data the smart devices are collecting and broadcasting, without requiring stepping into the process.
Device Security with Avira Inside Avira is bucking the industry trend of selling an additional box for Internet of Things security. As a software solution, Avira SafeThings™ is available only through internet service providers and through router manufacturers. To get Avira SafeThings™ covering the home network and router activity, interested consumers should talk to their local service provider or look for the Avira label on their next router. For more information, please visit: www.safethings.avira.com sst
Three Big Predictions for Sensors in the Security and Surveillance Market The market is expected to reach $12,012.1 million by 2023, states Frost & Sullivan
T
he Internet of Things (IoT) is bringing about a new era of connectivity in the digital age, connecting critical business sectors through a network of secure data flow, analytics, and management. It’s also bringing numerous opportunities for sensor participants through security technologies required for remote services and enhanced accessibility of devices. The total sensors market in security and surveillance applications was worth $6,267.9 million in 2016, with image sensors holding the largest market share at 23
percent. The market is expected to reach $12,012.1 million by 2023. North America and EMEA dominate the market, driven by aging infrastructures, but APAC is the fastest growing due to rapid infrastructure development, strong economic growth, and favorable government regulations. However, challenges for sensor manufacturers and suppliers include increased competition, leading to pricing pressures, lack of continue on page 43
42
Security Solutions Today • March / April 2018
DIGITAL SMART NATION
product differentiation, and lack of common global standards. Frost & Sullivan’s recent analysis, Sensors in Security and Surveillance, Global Forecast to 2023, covers global trends for sensors used in security and surveillance applications across industries such as industrial, commercial, institutional, building automation, infrastructure, and security and defense. The analysis also explores the impact of the Internet of Things (IoT) and Industrial Internet of Things (IIoT) on security and surveillance. The growth of IoT is contributing to rapidly evolving security requirements, with the areas of robotics and biometric and RFID sensors offering the greatest opportunities. Robotics is expected to be the future of security and surveillance, with considerable investments in research and development in this space. In addition, the demand for drones and AGVs remains strong, especially in defense, commercial, and institutional spaces. “In commercial and residential applications, biometric recognition used in access control systems is also witnessing a gradual increase in interest,” said Ram Ravi. “In addition, cloud networking, a revolutionary two-way interactive service delivery platform, is expected to create a technological explosion in the homes and buildings services market, particularly in commercial and residential security applications. This will enable homes and buildings participants to adopt new business models to provide attractive cloud-based services through a secured network.”
“The growth of IoT is contributing to rapidly evolving security requirements, with the areas of robotics and biometric and RFID sensors offering the greatest opportunities. Robotics is expected to be the future of security and surveillance, with considerable investments in research and development in this space. In addition, the demand for drones and AGVs remains strong, especially in defense, commercial, and institutional spaces.” communications for better business decisions. Sensors form the physical layer of the IoT architecture. Development of new communication protocols will ensure interoperability and provide standardisation, particularly in applications for perimeter security, intrusion detection, and access control systems.
Three big predictions for sensors in the global security and surveillance market:
Retail, healthcare and finance are all expected to offer considerable growth opportunities for sensors in biometrics.
Internet of Things (IoT) is paving the way for industry convergence and enabling machine-to-machine (M2M)
For more information, please visit: www.go.frost.com sst
Thought Worthy
“Trust is the backbone of IoT and there is no shortcut to success” - Giulio Correggio, Partner & Co Chair of IoT Law Group DLA Piper
March / April 2018 • Security Solutions Today
43
DIGITAL SMART NATION
IDEMIA Technology Powering a World Premiere Free Passenger Flow at Terminal 4 Singapore Changi Airport
I
DEMIA, the global leader in trusted identities for an increasingly digital world, provides a complete passenger processing biometric system at Changi Airport Terminal 4 in Singapore. The terminal was opened on October 31, 2017. IDEMIA (formerly known as OTMorpho) strives to enable people to communicate, connect, vote, move around and travel safely, while also giving end-users unparalleled convenience. In September 2015, Changi Airport – ranked world top airport for the fifth year in a row - selected IDEMIA to provide biometric identification
and authentication services as passengers pass through the airport’s most innovative terminal. The chosen solution based on IDEMIA’s MorphoPass Airport Solution provides automated passenger ID checks using facial recognition at all departure control points. The system includes a centralised platform used by airlines and the airport to manage the various steps required for passenger authentication and identification. MorphoFace (a game-changing face recognition device) and MorphoWay (a fully automated gate for both border control and smart boarding) form part of this end-toend solution and are fully deployed in Changi Airport Terminal 4 as part
of the Fast and Seamless Travel (FAST) program. T4 can handle up to 16 million passengers per year. “IDEMIA is thrilled to help passengers enjoy a secure and innovative seamless experience at Terminal 4, to provide the best customer experience to travelers. At Changi Airport we are proud to contribute to the creation of the airport of the future, combining the best of biometric accuracy, design efficiency and program execution”, declared Philippe Larcher, IDEMIA Executive Vice President Public Security. In the context of soaring world airport passenger numbers (2016: continue on page 45
44
Security Solutions Today • March / April 2018
DIGITAL SMART NATION
up 6.3% to 3.7 billion and 700 new routes), the need for passenger identification coupled with demanding safety standards is becoming ever more critical. While IDEMIA strives to protect passengers so they travel in complete safety, backed by novel and convenient solutions it also ensures there is no let-up in security standards for the sake of convenience. With MorphoPass, MorphoFace and MorphoWay, IDEMIA is now making a major contribution to ensuring passengers travel seamlessly and safely. sst
“The chosen solution based on IDEMIA’s MorphoPass Airport Solution provides automated passenger ID checks using facial recognition at all departure control points. The system includes a centralised platform used by airlines and the airport to manage the various steps required for passenger authentication and identification.”
Limelight Networks Report Reveals Only 21 Percent of Southeast Asian Consumers Feel Confident That Businesses Do Enough to Protect Against Cyber Attacks
O
nly 21 percent of Southeast Asian consumers feel “extremely confident” that businesses are doing enough to protect them against cybercrime, according to the ‘State of Cybersecurity’ research report from Limelight Networks, a global leader in digital content delivery. How a business responds to cyber-attacks therefore can significantly impact consumer trust and affect brand reputation and long-term revenue. The survey of consumers in Singapore, Malaysia, and the Philippines takes a close look at how consumers perceive the current state of cybersecurity in their online transactions. continue on page 46
March / April 2018 • Security Solutions Today
45
DIGITAL SMART NATION
“The vast majority of businesses who responded to the survey indicated that their organisation has implemented technologies to protect against DDoS and other attacks, which is especially important given that the majority of respondents indicated that their organization’s digital presence had been attacked in the past two years, resulting in site downtime or loss of data.”
Increasing cybercrime has not stopped consumers from continuing their online activities. While 91.47 percent of consumers in Southeast Asia check a site’s security before partaking in e-commerce or other activities, those in Singapore appear less concerned, with only 86.73 percent checking to see if a site is secured before initiating a transaction. When making a transaction, smartphones are the device of choice in Southeast Asia, and laptops coming in second. However, in Singapore, both laptops and Smartphones share the top spot (64.08 percent) to make online transactions. The Limelight report also found that a brand’s reputation and credibility were directly impacted once their website has been hacked. Yet, businesses are not sitting idly either. The vast majority of businesses who responded to the survey indicated that their organisation has implemented technologies to protect against DDoS and other attacks, which is especially important given that the majority of respondents indicated that their organisation’s digital presence had been attacked in the past two years, resulting in site downtime or loss of data. “With a potential cyber-attack lurking in the corner, brands can no longer rest on ‘legacy trust’ that they have built over the years. Today, it’s about building trust each time a customer transacts with a brand online. Cybersecurity is never a one-size-fits-all approach. Brands need to think about a multi-layered approach to security and explore the use of a cloud-based solution. They also need to employ a content delivery network (CDN) that can buffer volumetric attacks,” said Jaheer Abbas, Sales Regional Director, SE Asia and ANZ at Limelight Networks. “Not only can a CDN mitigate DDoS and other high-volume cyber-attacks, it can also have a significantly positive impact on the end-user experience
46
Security Solutions Today • March / April 2018
by improving the speed and quality of content delivery,” he added.
Additional Insight from the Report (Consumers)
•
• •
Brand integrity and cyber-attacks — When attacks occur, brand reputation falters and this impacts future business. According to the report, more than 70 percent of consumers change their opinions of a brand after a cyber-attack When it comes to cybercrime, consumers are most concerned about violations of financial and personal information (74.48 percent) Consumers are extremely concerned about the current state of cybersecurity and think businesses are not doing enough to stop threats
Additional Insight from the Report (Businesses)
• •
•
More than 75 percent of businesses feel that a sustained cyber-attack could have significant financial and brand implications When it comes to deploying cybersecurity solutions, the major hurdles to implementation are cost (24.37 percent) and lack of in-house expertise (23.73 percent) to manage security solutions For businesses deploying cybersecurity solutions, a combination of cloud and on-premise is preferred with 52.53 percent of respondents favoring this approach
For more information, please visit: www.limelight.com sst
DIGITAL SMART NATION
Schneider Electric Introduces Security Management Solution that Protects People and Maximises Productivity • •
EcoStruxure™ Security Expert helps users meet the unique safety challenges of their building environment Integrated solution enables clearer decisions, faster responses and maximum facility efficiency
S
ingapore – Schneider Electric, the leader in digital transformation of energy management and automation, today introduced EcoStruxure™ Security Expert, a new integrated security management solution that provides high performance access control and intrusion detection functionality to ensure the most secure building environment possible. EcoStruxure Security Expert is the latest addition to Schneider Electric’s EcoStruxure, its IoTenabled, plug-and-play, open architecture, which delivers endto-end solutions in six domains of expertise – Power, IT, Building, Machine, Plant and Grid – for four end markets, Building, Data Center, Industry and Infrastructure. EcoStruxure is driving digital transformation for Schneider Electric clients globally enabling them to be competitive in today’s digital economy. Combining innovative software and hardware with the latest IP technology, EcoStruxure Security Expert enables security and IT convergence, merging data from key security systems including video surveillance, intrusion detection, access control and alarm management. Security
Expert technology also tightly integrates with Schneider Electric’s SmartStruxure™ building management system (BMS) – powered by StruxureWare Building Operation software – to enable clearer decisions, faster responses and maximum facility efficiency. Building security data is made available via easy-to-use interfaces that span workstations, web stations and mobile devices. EcoStruxure Security Expert is ideal for a variety of building environments including hospitals, data centers, hotels and commercial buildings, including
large enterprises and small-to-midsized facilities. “Security Expert marks an evolution of intelligent building integration that aligns security and IT for enhanced building efficiency and performance,” said Puneet Dhiman, Global Director, Security Offer Management, Schneider Electric. “By bringing together previously disjointed building and security systems, facility managers and security personnel can work more effectively, better manage emergency situations and glean insights that continue on page 48
March / April 2018 • Security Solutions Today
47
DIGITAL SMART NATION
lead to improved building efficiency. We are committed to providing our customers with the world’s most open and innovative security solutions to help make more informed decisions and ultimately drive savings.” Traditional security and building automation systems operate independently, often resulting in severe limitations and custom builds that are costly to develop and maintain. With EcoStruxure Security Expert, organisations can share encrypted information between their core building and security systems to gain new levels of efficiency. For example, employee data can be shared between an organization’s HR and security systems to automatically grant new employees with access to relevant areas within the facility. Additionally, security systems can alert the BMS about building occupancy so lighting, HVAC and other building systems can be managed efficiently, which drives energy and cost savings. sst
48
Security Solutions Today • March / April 2018
“By bringing together previously disjointed building and security systems, facility managers and security personnel can work more effectively, better manage emergency situations and glean insights that lead to improved building efficiency.”
DIGITAL SMART NATION
Interconnected Teamwork in the Spotlight at INTERSCHUTZ 2020 At INTERSCHUTZ 2020, everything will revolve around interconnected technology and teamwork. For the first time, the world’s leading trade fair for the fire and rescue services, civil protection, safety and security will run under an overall motto to feature prominently throughout the event: “Teams, Tactics, Technology – Connected for Protection and Rescue”.
A
t INTERSCHUTZ 2020, everything will revolve around interconnected technology and teamwork. For the first time, the world’s leading trade fair for the fire and rescue services, civil protection, safety and security will run under an overall motto to feature prominently throughout the event: “Teams, Tactics, Technology – Connected for Protection and Rescue”. The motto draws attention to two key aspects now shaping the future of the sector: the use of innovative digital solutions and increased collaboration among the many professional organisations and institutions involved. INTERSCHUTZ is the world’s No. 1 event for the sectors it covers, and is unique in giving full coverage to cross-disciplinary interplay between the firefighting services, fire protection bodies, rescue services and civil protection organisations. The next INTERSCHUTZ will be staged in Hannover, Germany, from 15 to 20 June 2020. “Our chosen motto is designed to sharpen INTERSCHUTZ’s profile as an exhibition rich in innovations,” said Dr. Andreas Gruchow as the responsible member of Deutsche Messe’s Managing Board. “INTERSCHUTZ 2020 will be on the very cusp of today’s hottest developments. It will also cover all the many challenges arising from
the world’s continually evolving emergency and disaster scenarios, and will showcase the new technologies needed to cope with them.”
the firefighting, fire protection, rescue, safety and security services, enabling them to share knowledge with their international peers and broaden their networks.
Today’s challenges are considerable: terrorist acts, major man-made and natural disasters, unexpected failure of vital infrastructure and unprecedented refugee streams all require the collaboration of more and more highly-trained specialists. INTERSCHUTZ is the ideal platform for discussion on these challenges because it brings together professionals from all the relevant disciplines, including
The call for interconnectedness has gained a lot of ground across all the sectors represented at INTERSCHUTZ: “Firefighting has always been a team effort which leverages the best available technology and situationdependent tactics to protect and save human lives, property and the environment. It’s only with the right combination of these individual cogs – manpower, technology and tactics
“Today’s challenges are considerable: terrorist acts, major man-made and natural disasters, unexpected failure of vital infrastructure and unprecedented refugee streams all require the collaboration of more and more highlytrained specialists. INTERSCHUTZ is the ideal platform for discussion on these challenges because it brings together professionals from all the relevant disciplines, including the firefighting, fire protection, rescue, safety and security services, enabling them to share knowledge with their international peers and broaden their networks.” continue on page 50
March / April 2018 • Security Solutions Today
49
DIGITAL SMART NATION
– that fire crews can achieve utmost performance,” explained Hartmut Ziebs, President of the German Fire Services Association. “Society is undergoing rapid change, and we’ve seen the rise of new technologies – especially digital technologies – which have been evolving at a breathtaking pace. That’s why it’s incumbent on us, the fire services, to keep up with developments, just as we have been doing for the past 200 years or so.” Dirk Aschenbrenner, President of the German Fire Protection Association, supports this view: “To us, interconnection is much more than just a buzzword. We are fully aware that seamless integration and teamwork is essential to boosting the effectiveness of our rescue service, fire prevention and disaster protection efforts. And that holds true both for control centers and field operations.” New technologies are opening up myriad new options and ways of preventing and coping with crises and hazards. However, success hinges on more than just having the latest technology. It also needs to be deployed in a well-coordinated and proper way. “Digital
50
technology is the key to making this happen, whether we’re talking about satellite-based navigation to the incident site, instant access to local area, buildings and rescue plan info, radio communications and telemedicine,” Aschenbrenner added. “That’s why the new INTERSCHUTZ motto is right on mark. Only if we acknowledge the inextricably interconnected nature of teams, tactics and technology can we achieve our paramount goal: making the world a safer place.” Of course, a favorable climate for investment is another important factor, and in the words of Bernd Scherer, executive board member of the German Engineering Federation (VDMA) and CEO of the VDMA’s firefighting technology association, this is currently the case: “Since German municipal authorities are in good financial shape, our fire services are investing heavily in innovative technologies. This is benefiting all parts of the industry, from fire truck manufacturers to specialist equipment providers. We are also delighted to report buoyant demand from our export markets, which testifies once again to our industry’s reputation for
Security Solutions Today • March / April 2018
innovation and quality. We are very excited about the next edition of INTERSCHUTZ in 2020, not least because the fair is an important indicator of where the global industry is heading.” The new INTERSCHUTZ motto will highlight and explore a wide variety of issues, for instance the fact that increased technical integration goes hand in hand with dependence on the technologies used, thus increasing the risk of failure and complications in crisis situations. Or the question of how to enable societies to better cope with major crises. Clearly, raising public awareness of the potential threats and implementing resilience-enhancing measures will go a long way towards addressing these issues. And here, too, integration has a major role to play. After all, to be truly effective, the various emergency management and disaster relief agencies involved in a major crisis need to act in a coordinated way before and during the incident, both with respect to their communications and the technologies they use. For more information, please visit: www.interschutz.de sst
DIGITAL SMART NATION
Faraday Rooms and Air Gaps Don’t Keep Attackers from Accessing Highly Secure Computers
F
araday rooms or “cages” designed to prevent electromagnetic signals from escaping can nevertheless be compromised and leak highly sensitive data, according to new studies by Ben-Gurion University of the Negev’s Cyber@BGU. Research led by Dr. Mordechai Guri, the head of research and development of Cyber@BGU showed for the first time that a Faraday room and an air-gapped computer that is disconnected from the internet will not deter sophisticated cyber attackers. Air-gapped computers used for an organisation’s most highly sensitive data might also be secluded in a hermetically-sealed Faraday room or enclosure, which prevents electromagnetic signals from leaking out and being picked up remotely by eavesdropping adversaries. In two newly released reports, the team demonstrated how attackers can bypass Faraday enclosures and air gaps to leak data from the most highly secured computers. The Odini method, named after the escape artist Harry Houdini, exploits the magnetic field generated by a computer’s central processing unit (CPU) to circumvent even the most securely equipped room. “While Faraday rooms may successfully block electromagnetic signals that emanate from computers, low frequency magnetic radiation disseminates through the
“While Faraday rooms may successfully block electromagnetic signals that emanate from computers, low frequency magnetic radiation disseminates through the air, penetrating metal shields within the rooms. That is why a compass still works inside of a Faraday room. Attackers can use this covert magnetic channel to intercept sensitive data from virtually any desktop PCs, servers, laptops, embedded systems and other devices.” air, penetrating metal shields within the rooms,” explains Dr. Guri. “That’s why a compass still works inside of a Faraday room. Attackers can use this covert magnetic channel to intercept sensitive data
from virtually any desktop PCs, servers, laptops, embedded systems and other devices.” In another documented cyberattack dubbed Magneto, researchers utilised malware keystrokes and passwords on an air-gapped computer to transfer data to a nearby smartphone via its magnetic sensor. Attackers can intercept this leaked data even when a smartphone is sealed in a Faraday bag or set on “airplane mode” to prevent incoming and outgoing communications. Dr. Guri’s research team includes BGU Department of Electrical and Computer Engineering Ph.D. student Boris Zadov, Andrei Daydakulov and Prof. Yuval Elovici, who is director of Cyber@BGU and the Deutsche Telekom Innovation Labs@BGU, and a member of BGU’s Department of Software and Information Systems Engineering. sst
March / April 2018 • Security Solutions Today
51
FUN FACTS | THE INTERNET OF EVERYTHING IS EVERYTHING
The IoT will account for one quarter of the global
41 million 5G connections in 2024, according to Machina Research. Japan and Korea will lead the charge, and embedded factory-fit connected cars will be the biggest IoT application using 5G.
For a device to be labeled as IoT, according to The Internet of Things Global Standards (IoT-GSI) it must have seven design features: sensors, internet connectivity, processors, energy efficiency, cost effectiveness, quality and reliability, and security.
For every living person on earth, there will be
Kevin Ashton, a British technology pioneer who cofounded the Auto-ID Center
at the Massachusetts Institute of Technology (MIT), which created a global standard system for RFID and other sensors, is known for coining the term "the Internet of Things" to describe a system where the Internet is connected to the physical world via ubiquitous sensors.
52
Security Solutions Today • March / April 2018
between two and six connected things by 2020, according to IoT Analytics.
The most “popular” IoT applications—based on number of news items,
Tweets, LinkedIn posts and Google search items—are Wearables, Smart City, Smart Home, Industrial Internet and Smart Grid, according to IoT Analytics.
THE INTERNET OF EVERYTHING IS EVERYTHING | FUN FACTS
Business and Governments will be the top users of the
IoT by 2020, according to BI Intelligence, with Consumer applications falling to a distant third (less than half of business use).
The chance of running out of IP addresses because of
IoT devices coming online is slim. There are currently five IP addresses assigned on average per inhabitant in the US. Steve Leibson from EDN Network puts IPv6 in perspective: We could assign 105 IP address to every atom on the surface of Earth and still not have an issue.
The Future Impact of the Internet of Things Fun Facts on the Phenomenon of Connectivity
According to Intel, ATMs were the first end useroriented elements to be connected online back in the 1970s.
Asia-Pacific is the largest market for the Industrial IoT, according
Gartner predicts that hardware and software advances will make IoT security a fast-evolving area through 2021, and the IoT security skills shortage today will only accelerate.
to TechNavio, valued at close to US$38 billion in 2015. APAC is expected to reach over US$54 billion in 2020, growing at a CAGR of more than 7 percent.
March / April 2018 • Security Solutions Today
53
INSIDE LOOK | DATA BREACHES AND CUSTOMER LOYALTY 2017
Data Breaches and Customer Loyalty 2017 FF By © Gemalto 2017
Majority of Consumers Would Stop Doing Business with Companies Following a Data Breach
54
Security Solutions Today • March / April 2018
C
onsumers are evidently happy to relinquish the responsibility of protecting their data to a business, but are expecting it to be kept secure without any effort on their part. In the face of upcoming data regulations such as GDPR, it’s now up to businesses to ensure they are forcing security protocols on their customers to keep data secure. It’s no longer enough to offer these solutions as an option. These protocols must be mandatory from the start – otherwise businesses will face not only financial consequences, but also legal action from consumers.
DATA BREACHES AND CUSTOMER LOYALTY 2017 | INSIDE LOOK
The majority (70%) of consumers would stop doing business with a company if it experienced a data breach, according to a survey of more than 10,000 consumers worldwide. In addition, seven in ten consumers (69%) feel businesses don’t take the security of customer data very seriously. Despite these concerns, the Gemalto study found that consumers are failing to adequately secure themselves, with over half (56%) still using the same password for multiple online accounts. Even when businesses offer robust security solutions, such as two-factor authentication, two fifths (41%) of consumers admit to not using the technology to secure social media accounts, leaving them vulnerable to data breaches. This may be because the majority of consumers (62%) believe the business holding their data is mostly responsible for its security. It’s resulting in businesses being forced to take additional steps to protect consumers and enforce robust security measures, as well as educate them on the benefits of adopting these. Retailers (61%), banks (59%) and social media sites (58%) were found to have a lot of work to do, with these being sectors that consumers would leave if they suffered a breach.
Consumer and Organisations’ Security Measures to Prevent Breaches On average, surveyed consumers feel that around two thirds (67.79%) of the responsibility for protecting and securing customer data falls on to the company, rather than the customer. But, only just over a quarter (27%) of respondents feel that companies take the protection and security of customer data very seriously. Consumers believe that organisations should have this responsibility, but that organisations are not taking this seriously enough.
The Gemalto study found “ that consumers are failing to
adequately secure themselves, with over half (56%) still using the same password for multiple online accounts. Even when businesses offer robust security solutions, such as two-factor authentication, two fifths (41%) of consumers admit t o not using the technology to secure social media accounts, leaving them vulnerable to data breaches.
”
March / April 2018 • Security Solutions Today
55
INSIDE LOOK | DATA BREACHES AND CUSTOMER LOYALTY 2017
Providing Organisations Feedback
Consumers Having Their Data or Identity Stolen
The majority (82%) of surveyed consumers would like organisations to have greater online security, this is likely to be amplified by the fact that only the minority think that organisations take this very seriously.
Two thirds (67%) of surveyed consumers are worried that their online personal information will be stolen at some point. This should be even more of a concern for consumers who use the same password across multiple accounts as more will be at risk.
The vast majority (87%) of respondents have either already provided organisations with feedback on what security methods they are offering (34%), have considered it in the past (19%) or are likely to consider doing so in the future (33%). Organisations can anticipate an increase in the proportion of customers who are likely to contact them about the security methods that they offer in the future.
The Use of Two-Factor Authentication Of the surveyed consumers that use online retail accounts, it is only around three in ten (28%) who say that all of the online retail apps/websites that they use require twofactor authentication to secure online transactions. This suggests that the majority of online retailers do not require this level of authentication, and may be why so few consumers believe that security is taken very seriously by organisations. Of those who actively use social media accounts, only around a quarter (27%) use two-factor authentication to secure all of their social media accounts, despite almost all social media platforms offering it. This suggests that consumers may not realise that organisations are offering this type of security method, or choose not to use it.
Consumer passwords The proportion not using the same password for any accounts has decreased, 46% in 2015, 47% in 2016 and now 44% in 2017. Are consumers becoming more careless with their passwords? One in seven (14%) consumers admit that they use the same password for all of their accounts. The majority of consumers are putting themselves at risk by using the same password for multiple accounts. If a password was hacked from one account, it would likely give the hacker access to a number of different online spaces for the individual.
56
Security Solutions Today • March / April 2018
Passwords – Respondents who use the same passwords for all accounts are the most likely to strongly agree with this statement (33% do).
Reasons Why Consumers Have Been Victims The most likely reasons why consumers have been a victim of a breach include visiting a fraudulent website (44%), phishing (42%) or clicking on a fraudulent web link (42%). With no clear majority, there are many different causes of a consumer falling victim to a breach, which could be why so many are worried it will happen to them at some point.
Taking Legal Action Following a Personal Information Breach Nearly half (49%) of surveyed consumers who have been
a victim of a breach either have (31%) or are considering (18%) taking legal action against any of the parties involved in exposing/taking the personal information. Of those who already have taken legal action, around half (49%) of them say that they did this out of principle, and that they would do it regardless of what was exposed. More than a quarter (27%) of them have taken legal action previously too. Organisations need to be aware that they could face a legal battle with their customers if they suffer a breach.
Likelihood of Being a Victim in the Future Surveyed consumers in 2017 are more likely (37%) to believe that they could be a victim of a breach at any time, compared to those surveyed in 2016 (35%) and 2015 (27%). Almost three in five (58%) consumers believe that the threat to their personal information increases during a high profile commercial event (such as Black Friday, Amazon Prime Day or Christmas).
DATA BREACHES AND CUSTOMER LOYALTY 2017 | INSIDE LOOK
“
Two thirds (67%) of surveyed consumers would be unlikely to do business with a company again where financial and sensitive information were stolen. This is also the case for around half of respondents where only passwords were stolen (51%) or where only non-financial information were stolen (49%).
”
This suggests that consumers concerns are on the rise and that they believe that they are more likely to fall victim of a breach on a high profile commercial event.
Future Legal Action Despite only around half of those who have been a victim taking, or considering taking, legal action the majority (59%) of all surveyed consumers say that they would take legal action if it happened to them. Around a further third (34%) of consumers say that they would consider taking legal action in the event of a breach being experienced that exposed their personal information. Companies could face more legal battles with consumers if they do not have the right security in place to protect their customers’ data.
Where the Most Risk Comes From Around six in ten (58%) feel that social media is the greatest risk. This is despite most social media sites offering twofactor authentication, and only the minority using this service (Fig 6). However, the concern could be more around the information that they share on their social media accounts getting into the wrong hands. Just over four in ten (41%) surveyed consumers believe that banking poses the greatest risk.
Who Consumers Trust the Most Consumers are most likely (33%) to trust their bank. However, even more believe that banking exposes them to the greatest risk when it comes to the security of their personal data. Just over one in five (21%) do not know who to trust, suggesting that they perhaps trust no-one. Will consumers use organisations that have suffered a breach?
The Threat to Businesses Two thirds (67%) of surveyed consumers would be unlikely to do business with a company again where financial and sensitive information were stolen. This is also the case for around half of respondents where only passwords were stolen (51%) or where only non-financial information were stolen (49%). Around six in ten respondents admit that they would stop using a retailer (61%), bank (59%) or social media site (58%) if it suffered an online breach. Not only could organisations anticipate legal action being taken against them, they are also likely to lose customers if they experience a breach.
Consumers Trust Some Industries More Than Others When it comes to the businesses that consumers trust least, over half (58%) believe that social media sites are one of the biggest threats to their data, with one in five (20%) fearful of travel sites – worryingly, one in 10 (9%) think no sites pose a risk to them. On the other hand, a third (33%) of consumers trust banks the most with their personal data, despite them being frequent targets and victims of data breaches, while industry certified bodies (12%), device manufacturers (11%) and the government (10%) next on the list. It’s astonishing that consumers are now putting their own data at risk, by failing to use these measures, despite growing concerns around their security. It’s resulting in an alarming amount of breaches – 80% – being caused by weak or previously stolen credentials. Something has to change soon on both the business and consumer sides or this is only going to get worse. For more information, please visit: www.gemalto.com sst
March / April 2018 • Security Solutions Today
57
INSIDE LOOK | MALWAREBYTES REVEALS 2018 SECURITY PREDICTIONS
2018 Security Predictions RevealED
58
Security Solutions Today • March / April 2018
MALWAREBYTES REVEALS 2018 SECURITY PREDICTIONS | INSIDE LOOK
Cyber threats will increase from hyped hacker fame and profit, PowerShell based attacks, growing worm functionality and IoT vertical growth
M
alwarebytes, the leading advanced malware prevention and remediation solution, today announced its 2018 cybersecurity predictions. The company predicts top threats in 2018 will include a rise in browser-based cryptomining, PowerShellbased attacks, hackers using security software as a back door, adaptive worm functionality and the growing connectivity in all industries, with both the education and healthcare sectors increasingly targeted.
With the new-year around the corner, security researchers at Malwarebytes Labs have compiled a list of predictions likely to impact businesses and consumers in 2018.
The year 2017 was brutal, with global ransomware attacks, including Wannacry, Petya and NotPetya increasing, and unprecedented data breaches such as Equifax and the loss of 198 million voter records.
“While none of the APAC countries topped the list of drive-by mining activity globally, we suspect that we will see far more activity in in the region come 2018, particularly as the value of cryptocurrency escalates. What makes this kind of activity interesting is how it has created a blurry line between the everyday Internet user and the cybercriminal.”
“Our Labs’ findings show no signs of a slow down in 2018,” said Jeff Hurmuses, Managing Director and Area Vice President, APAC, Malwarebytes. “Hacker tools and techniques are increasing in sophistication and accessibility. We are seeing a new army of cybercriminals coalesce, lured by inexpensive tools and the promise of an easy profit often publicised and glorified in the media. The forthcoming attacks will require more cybersecurity training, increased education and awareness and a multi-layered approach to business and personal security.”
The Cryptomining “Gold Rush” Will Be the Top Priority for Cybercriminals Cryptomining activity has been exploding toward the end of 2017. In one day alone this year, Malwarebytes blocked 11 million
“
”
connections to coin mining sites. In the Asia Pacific, emerging markets such as the Philippines, Thailand and Indonesia are seen as the top targets for cryptomining events,according to Malwarebytes’ telemetry from October this year. While none of the APAC countries topped the list of drive-by mining activity globally, we suspect that we will see far more activity in in the region come 2018, particularly as the value of cryptocurrency escalates. What makes this kind of activity interesting is how it has created a blurry line between the everyday Internet user and the cybercriminal. An individual mining cryptocurrency could very well be mining for their own wallet, based on visitors to their own web properties. There is also a very likely chance within those circumstances that disclosed cryptomining activity could replace advertising on sites to become an entirely new revenue stream. However, the largest portion of cryptomining is likely to occur from legitimate websites compromised to mine currency for the criminal wallet. Regardless, cryptomining will be one of the cybercrime activities to watch in 2018.
We Will See An Increase in PowerShell-Based Attacks Earlier this year, entities of the Saudi Arabian government were compromised using a macro in Word to infect the target’s computer with an informationstealing Trojan . Rather than retrieving a binary payload, the attack relied on malicious scripts to maintain persistence on the device and to communicate with compromised websites acting as proxies for the command and control server. These malicious script-based attacks, specifically PowerShell-based attacks, are incredibly difficult to identify. They can easily evade antivirus engines, making it that much more appealing to cybercriminals.
March / April 2018 • Security Solutions Today
59
INSIDE LOOK | MALWAREBYTES REVEALS 2018 SECURITY PREDICTIONS
We predict many more PowerShell attacks in the year to come.
Educational Institutions will Be a Prime Target Despite increasing sophistication, cybercriminals will continue to target the easiest endpoints to penetrate. Educational institutions are often an under-protected patchwork of systems, lacking the resources to defend themselves. There is a loose network of seemingly unlimited endpoints containing a massive amount of proprietary data on students, faculty and parents. Furthermore, educational institutions serve as a great platform for hackers to access government and research data, similar to how cybercriminals recently used advanced persistent threats (APT) to attack the systems of National University of Singapore (NUS) and Nanyang Technological University (NTU) earlier this year. As we have witnessed, the data thefts of the last year often target the richest data available. Education systems seem like the next most likely target for cyber attacks. This is partially due to their richness and piecemeal security.
The Cybercriminal Underground Will Continue to Evolve and Grow While it may seem like we are already overwhelmed by the amount of cyberattacks occurring daily, this will not slow down in 2018. In fact, with a recent increase in cybercriminal tools and a lower threshold of knowledge required to carry out attacks, the pool of cybercriminals will only increase. This growth is a likely response to news media and pop culture publicizing the profitability
60
Security Solutions Today • March / April 2018
and success that cybercrime has become. Ransomware alone was a $1 billion industry last year. Joining the world of cybercrime is no longer taboo, as the stigma of these activities diminishes in parts of the world. To many, it’s simply a “good” business decision. At the same time, those already established as “top-players” in cybercrime will increase their aggressive defense of their criminal territories, areas of operations and revenue streams. We may actually begin to see multinational cybercrime businesses undertake merger and acquisition strategies and real-world violence to further secure and grow their revenue pipeline.
Security Software Will Have a Target on Its Back In 2018, cybercriminals will target and exploit more security software. By targeting trusted programs and the software and hardware supply chain, attackers can control devices and wholeheartedly manipulate users. Hackers will leverage and exploit security products, either directly subverting the agent on the endpoint, or intercepting and redirecting cloud traffic to achieve their means. As these events become more publicly known, the public and business perception of security software, particularly that of antivirus solutions (AV), will further deteriorate.
More Cyber Criminals will Use Worms to Launch Malware In 2017, we saw Wannacry and Trickbot use worm functionality to spread malware. More malware families will use this technique in 2018 because network
MALWAREBYTES REVEALS 2018 SECURITY PREDICTIONS | INSIDE LOOK
With the ability for medical devices to connect directly to the Web, “ the growing Internet of Things (IoT) model offers many benefits. Greater
connectivity means better data and analytics and patient care, but it also opens the door for data loss of personal health information (PHI) and unauthorised access to devices.
”
compromise from worms spread faster than many other methods. If hackers can figure out how to use worms without being too noisy (a traditional downfall of this approach), this tactic can amass a large number of victims very quickly.
IoT will Fuel Additional Data Security and Patient Concerns in 2018 With the ability for medical devices to connect directly to the Web, the growing Internet of Things (IoT) model offers many benefits. Greater connectivity means better data and analytics and patient care, but it also opens the door for data loss of personal health information (PHI) and unauthorised access to devices. The healthcare industry will need to closely examine a new era of connectivity and patient security. Similar to the electronic health record (EHR) conversion, security protocols will need to change and evolve to meet the growing threat. Devices should have strict authentication, limited access and heavily scrutinised device-to- device communications. Encryption will be a crucial element of securing these devices, a responsibility that if not adopted by device providers and manufacturers, is likely to be driven by third-party security providers.
Cybersecurity Posture in ASEAN to Improve The ASEAN region will likely see a more concerted
effort by local governments to shore up cyber security capabilities for both the public and private sectors. With Singapore having recently announced plans to table a new Cybersecurity bill, other regional nations are likely to follow suit. Malaysia has also recently announced plans to augment its cybersecurity talent pool, whilst Indonesia launched a national cyber agency recently. We anticipate that by the end of 2018, overall levels of cybersecurity in the region will improve via government led collaboration in the region.
Mobile Malware on the Rise in the Asia Pacific With the rising mobile penetration rates and weak cyber regulations in developing markets in the region, smartphones are becoming a more attractive channel for hackers as opposed to PCs. Countries such as the Philippines, Malaysia and Indonesia are already seeing wide spread usage of mobile banking and social media via smartphones. However, the lack of regulation results in third-party app stores selling malicious apps, and pirated software left unpatched due to lack of official support in the region. Outdated prevention security, use of pirated software, lack of remediation or response and poor cyber hygiene will continue to contribute to increasing levels of mobile malware in the region. For more information, please visit: www.malwarebytes.com sst
March / April 2018 • Security Solutions Today
61
FUN FACTS | THE INTERNET OF THIREATS
Botnets and DDoS Attacks Mirai infected approximately 2.5 million IoT devices, including printers, routers and Internet-connected cameras in September 2016. The botnet creators used it to launch distributed denial of service (DDoS) attacks, including an attack against cybersecurity blog KrebsonSecurity. Essentially, the attackers used all the devices infected with Mirai to attempt to connect to the targeted website at the same time, in the hopes of overwhelming the servers and preventing anyone from reaching the site.
Remote Recording The possibility that attackers could hack into IoT devices and record the owners without their knowledge came to light as a result of the work of the Central Intelligence Agency (CIA). Secret documents revealed that vulnerabilities in smart TVs, as well as Android and iOS smartphones could be intruded upon. The obvious implication is that criminals could also be exploiting these vulnerabilities for nefarious purposes. The implications of this are on a frightening scale considering how connected we have become as a society.
Since Mirai first made news, attackers have launched other IoT botnet attacks, including Reaper and Hajime. Experts say to expect more attacks like this in the future.
Spam In January 2014, one of the first-ever known attacks involving IoT devices used more than 100,000 Internet-connect devices, including TVs, routers, and at least one smart refrigerator to send 300,000 spam emails per day. The attackers sent no more than 10 messages from any one device, making it very hard to block or pinpoint the origin of the attack. This early attack was far from the last. IoT spam attacks were continuing last fall with Linux.ProxyM IoT botnet.
The Internet of Threats Securing the IoT 62
Security Solutions Today • March / April 2018
THE INTERNET OF THREATS | FUN FACTS
APTs
Advanced persistent threats (APTs) have become a major concern for security professionals as they are highly capable attackers, such as nation-states or corporations, that launch sophisticated cyberattacks that are difficult to prevent or mitigate. For example, the Stuxnet worm that destroyed Iranian nuclear centrifuges and the 2014 Sony Pictures hack have been attributed to nation-states. As more critical infrastructure gets connected to the Internet, many experts warn that APTs could launch an IoT attack targeting the power grid, industrial control systems or other Internetconnected systems. Some have even warned that terrorists could launch an IoT attack that could cripple world economies.
Enter your email Password Next
Ransomware Data Theft Obtaining sensitive data, such as customer names, credit card numbers, social security numbers and other personally identifiable information, continues to be one of the primary goals of cyberattacks. According to the Ponemon Institute, the average data breach costs companies $3.62 million, or about $141 per record stolen. IoT devices represent a whole new attack vector for criminals looking for ways to invade corporate or home networks. For example, if an improperly secured IoT device or sensor is connected to enterprise networks, that could give attackers a new way to enter the network and potentially find the valuable data they are looking for. This has happened with Chinese SMART home devices being used as a point of entry for hackers to wreck havoc.
Ransomware has become too prevalent on home PCs and corporate networks. Now experts say it is just a matter of time before ransomware attackers start locking up smart devices. Security researchers have already demonstrated the ability to install ransomware on smart thermostats. They could, for example, turn up the heat to 95 degrees and refuse to turn it back to normal until the owner agreed to pay a ransom in Bitcoin. They might also be able to launch similar attacks against connected garage doors, vehicles or even appliances. How much would you pay to unlock your smart coffee pot first thing in the morning?
Home Invasions As smart locks and smart garage door openers become more commonplace, it also becomes more likely that cybercriminals could become real-world thieves. Home systems that are not properly secured could be vulnerable to criminals with sophisticated tools and software. Disturbingly, security researchers have demonstrated that it is fairly easy to break into smart locks from several different manufacturers, and smart garage doors don’t seem to be much safer.
Remote Vehicle Control As vehicles become smarter and gain connections to the Internet, they also become vulnerable to attack. Hackers have shown that they could take control of a Jeep, setting the air conditioning to maximum, changing the radio station, starting the wipers and eventually slowing the vehicle to a stop. The news led to a recall of 1.4 million vehicles, but the white-hat researchers behind the original exploit said that they found additional vulnerabilities that were not addressed by the patch Chrysler applied to the recalled vehicles. Although experts say that the auto industry is doing a better job of securing vehicles, it is almost certain that attackers will find new vulnerabilities in connected cars. The fact that even public transport is becoming SMART these days spells out potential disasters in the making if not secured.
March / April 2018 • Security Solutions Today
63
IN FOCUS | AN INTERVIEW WITH KAHA
Could you please tell us about your IoT platform and how it utilises the IoT (Internet of Things) to improve one’s quality of living/safety and privacy?
Interview with SUDHEENDRA S CTO & CO-FOUNDER OF KAHA.
The unique patented smart wearable platform architecture company that is based in Singapore. A pioneer in the field of innovative technologies, we found out all about their IoT driven apps that aim to enhance personal and public safety.
The concept behind IoT is really about the smart application of connected technology. Whether it is improving business processes and manufacturing as in the case of Industry 4.0, or improving the consumer journey and experience, IoT is meant to help us work and live better. KaHa’s smart wearables and app features a well-thought and elaborate safety solution, among many other solutions, using our patented IoT platform architecture. Our Safety feature focuses on getting help in emergencies, and through smart technology such as geolocation, ensures the help is efficient and timely. KaHa is working on further innovations in preventive solutions. KaHa’s solutions in Health focuses on daily wellness and health issues, helping users manage stress, sleep better, and also stay fit, with a longer-term positive effect on the consumer’s health.
You showcased various solutions at the CES 2018 in Las Vegas such as the Safety Heat Maps, Safe Route Suggestions, Sleep Better and Stress Management. Please tell us how Kaha is taking security and safety to the next level with these solutions? We are passionate about improving the consumer journey and experience, so we look at different consumer verticals including Safety and Health & Wellness, and we look at how we can provide innovative solutions and features in these areas that improve the consumer experience. KaHa’s Safety solution has unique
64
Security Solutions Today • March / April 2018
AN INTERVIEW WITH KAHA | IN FOCUS
KaHa focuses on innovation and innovating the “ consumer journey. We are one of the few companies globally that provide customisable end-to-end smart wearable IoT solutions which offers flexibility for launching smart networked devices and a one-stop solution for brands to bring exciting smart wearables to their customers.
”
features that are comprehensive and well-research, spanning a range of uses that taps on geolocation and social:
•
•
•
SOS Alerts that can be easily initiated using our wearable devices, hence making it convenient and accessible even in dire situations A unique Safety Network concept, which helps users create a trusted network of people and designated guardians, ensuring help is always nearby Live location tracking is supported, with web-based solutions so that even when the designated Guardian/SOS Recipient does not have our app installed, they are still help
•
•
LIVE SAFETY Heat Map, which is provided to let the user get a feel of the level of safety of different localities. The safety map is generated by Artificial Intelligences (AI) algorithm, which is based on continuous analysts of more than 10 parameters Safe Route suggestion, where our solution provide safer alternatives for travelling from one place to another
KaHa’s stress management solution helps users manage stress as it occurs, thus reducing the longerterm health effects. KaHa’s IoT wearable devices have intelligent algorithms and sensors to detect stress and immediately prompt users with stress relieving exercises like breathing. This means our stress management
March / April 2018 • Security Solutions Today
65
IN FOCUS | AN INTERVIEW WITH KAHA
solution actually helps users manage stress in real-time as it occurs, thus reducing longerterm health effects associated with stress. The entire Stress Management solution can be implemented on the wearable device itself, thus making it convenient and instantaneous.
As a pioneer in the industry with some of the most advanced wearables around the world, what are your achievements in terms of smart products? KaHa focuses on innovation and innovating the consumer journey. We are one of the few companies globally that provide customisable end-to-end smart wearable IoT solutions which offers flexibility for launching smart networked devices and a one-stop solution for brands to bring exciting smart wearables to their customers.
from incorporating smart tech into analogue watches to delivering finished white label products. KaHa platform allows companies to get products with innovative feature and high quality and also get the benefit of fast time to market and low cost of innovation Our innovations and patented solutions allow us to provide differentiating offerings in consumer verticals such as Safety, Sports & Fitness, Health & Wellness, Convenience, Lifestyle, and Special Needs.
The IoT and connectivity of products poses as a huge cyber security risk as hackers have breached the security of everything from transport services to banks by finding an open door in connected products, apps etc. What measures do you have in place to protect your users?
KaHa also provides NextGen OEM solution for smart analogue watch:
We recognise that when it comes to personal devices, the user’s data and privacy are of utmost concern. We never store user data on the IoT smart wearable device, so even when the device is lost or hacked, there is no direct risk
KaHa’s smart wearables and app “ features a well-thought and elaborate
safety solution, among many other solutions, using our patented IoT platform architecture. Our Safety feature focuses on getting help in emergencies, and through smart technology such as geolocation and unique social network, ensures the help is efficient and timely. KaHa is working on further innovations in preventive solutions.
”
66
Security Solutions Today • March / April 2018
of data leak. All data interaction with KaHa servers are protected by industry standard 128 or 256bit encryption. We subject our servers to frequent security audits, including audits by third part security agencies, to identify and close any potential gaps.
Please tell us more about your smart solution utilised in India where the police can be alerted if and when an individual is in danger? Are there any plans to introduce this elsewhere such as in countries with an aging population (Japan etc.) where this may be extremely useful for elderly who are living alone. The user easily uses their device to send an SOS alert, which is sent to designated Guardians of the user. These Guardians are able to see, on their smartphones, the locations of the user’s pre-set Safety Network of friends and family, and are able to quickly identify the nearest member of the network and activate them to help. We also added features
AN INTERVIEW WITH KAHA | IN FOCUS
on how we use AI and machine learning data to manage stress. By simply entering information such as age and weight, KaHa technology provides users with health & wellness guides. Our wearable devices are equipped with sensors and AI algorithms that can determine your baseline stress levels and recommend heart rate ranges, and when a threshold is crossed, it automatically prompt you so you are aware, and can also prompt you on breathing exercise that can help bring your stress level down.
on the wearable device such as initiating emergency calls to the police or medical service, including the option to send a pre-recorded message. A user in distress can also record a message while using the SOS button, which is sent to their Guardian or emergency service personnel. This solution can be used globally, anywhere in the world. We are currently working with potential partners in some countries, including Japan.
Please tell us more about AI to not only monitor one’s heartbeat but also detect irregularities and send alerts pertaining to this? What are some applications present and future for this app? Many of our features use AI and Machine Learning to analyse data and provide value-add to the consumer. In present times, especially work-related stress is inevitable. Our Heart Rate Monitoring feature is a response
Other applications include parental monitoring of children, for example as intervention for children undergoing stress from unidentified reasons. A possible use case could allow parents to track their children’s daily activity and identify noticeable periods where the child’s stress levels are high, allowing the parents to identify
the cause. The device could also be used to automatically record audio or video during periods where the child is stressed, and this information can help the parents identify the problem and resolve it. Another application is Sleep Better, where our AI algorithms detects co-relations between different parameters like bio-data (such as age and weight), fitness activity, sleep quality, and determines what activity contribute to better sleep, and prompts users with recommended fitness activity to improve their sleep. The algorithm is constantly learning via Machine Learning, as it gets more data from users who undertake these recommendations, and improve its accuracy. For more information, please visit: www.coveiot.com sst
PROFILES PAWAN GANDHI CEO & FOUNDER
Pawan has over 10 years of experience in leadership position at Nokia and WorldSpace. Pawan has been responsible for P&L at Nokia, managed consumer services and sales and a member of the team responsible for WorldSpace IPO in 2005.
JUSTIN TANG
COO & CO-FOUNDER
Justin has over 20 years of experience and he specializes in content services for mobile and internet, product and program management and is an old hand at operational logistics. At KaHa, Justin is responsible for global operations and deliveries.
SUDHEENDRA S
CTO & CO-FOUNDER
Sudheendra has 2 decades of experience in software development. At KaHa, Sudheendra is vested with the responsibility and overseeing all the technology underlying the magic created by our products.
March / April 2018 • Security Solutions Today
67
SECURITY FEATURE
Why Business is Looking Good For
Ransomware Criminals N
ew findings from a report that we have just released show that it is easier than ever for criminals to extort money from victims through ransomware. Our report, The Ransomware Economy, found that the market from this insidious form of malware is now worth an estimated $1 billion.
FF By Michael Viscuso
Co-Founder & Chief Technology Officer, Carbon Black Michael Viscuso drives the development of Carbon Black’s long-term company and product strategy. He was co-founder and chief executive officer of Carbon Black, which merged with Bit9 in February 2014. A business-minded technologist, Viscuso is known for his drive and sense of mission and is highly regarded in the Computer Network Operations community as a top mind in offensive security. He co-founded Carbon Black in 2011 to provide organizations with unmatched protection, detection, and incident response capabilities. Prior to the merger with Bit9, Viscuso led Carbon Black’s rapid rise and brand recognition in the market. Viscuso earned bachelor’s degrees in mathematics and computer science at Villanova University.
68
Security Solutions Today • March / April 2018
Investigations by our Threat Analysis Unit (TAU) highlighted that cybercriminals are increasingly seeing opportunities to enter the market and looking to make a quick buck via one of the many ransomware offerings available on illicit dark web marketplaces. In addition, the basic appeal of ransomware is simple: it is turnkey. Unlike many other forms of cyberattacks, ransomware can be quickly and brainlessly deployed, promising great returns with minimal costs. As a result, the amount of money being extorted through ransomware is much higher than it’s ever been – ransomware transactions increased from $24 million to $1 billion from 2015 to 2016. The size of the market is now allowing criminals to specialise in niche sectors within the ransomware economy. When the market emerged, criminals had to start by doing it all themselves to maximise profits. But as the market continues to grow and the price of each sale increases, criminals are happy to settle for a smaller piece of a very large pie. This means that jobs in the ransomware economy have become more
SECURITY FEATURE
specialised, with dedicated professionals tasked to focus on specific parts of a ransomware sale. Market segmentation allowed criminals to get better at what they were doing and increased chances of successfully using ransomware as a form of a cyberattack. This also means that individual criminals no longer require extensive knowledge or the complete skillset needed to mount a ransomware attack. Criminals can simply buy professional services that do their jobs for them, therefore, significantly lowering the barrier to entry to launch an attack. This ease of access has been the main driver behind the growing frequency of ransomware attacks.
Payment From the Underground Surprisingly, one of the biggest hurdles for ransomware criminals was not getting malware onto a computer, instead, it was getting the money from it. During ransomware attacks in the past, criminals had to rely on wire transfers or credit card payments to get the money from victims but there were several challenges with these methods. Wire transfers were hard for victims to initiate, making them less likely to pay up through this approach. On the other hand, credit card payments leave a digital trail of breadcrumbs that allows the victim to reach out to their credit card company to cancel the payment. The advent of bitcoin has provided a “middle ground”, an easy way for criminals to access payment facilities. Similar to a wire transfer, the payment cannot be reversed once made. Bitcoin is also easier to set up than a wire transfer and it is in the victim’s realm of convenience: they’d rather pay up via bitcoin than get a new computer.
March / April 2018 • Security Solutions Today
69
SECURITY FEATURE
Crime and Punishment Unlike normal criminals, cybercriminals can use the current jurisdiction to their advantage. With normal crime, both the victim and criminal are usually in the same jurisdiction. Ransomware attacks are borderless and many times, the victim and perpetrator are situated in different countries. The victim of a cyberattack can be based in London, but the crime was actually committed in China. So, under which jurisdiction should the prosecution be pursued in? The lack of clarity over international cyber policies makes this an incredibly difficult problem to solve, and also heavily favours the criminals. Understanding the problem is often the key to solving it. To better understand ransomware criminals, we can classify them into three tiers: the authors of the malicious code; those that leverage the malware (by offering ransomware-
70
Security Solutions Today • March / April 2018
The size of the market is now allowing criminals to specialise in niche sectors within the ransomware economy. When the market emerged, criminals had to start by doing it all themselves to maximise profits. But as the market continues to grow and the price of each sale increases, criminals are happy to settle for a smaller piece of a very large pie. This means that jobs in the ransomware economy have become more specialised, with dedicated professionals tasked to focus on specific parts of a ransomware sale.
SECURITY FEATURE
as-a-service), and the distributors. To successfully combat an army of ransomware criminals, we must start by attacking the masterminds by limiting the incentives for malware authors. This means using a predictive security cloud model that identifies the most dangerous threats facing an organisation. By combining big data analytics with information from within an organisation’s systems to identify potential attacks, threats and other indicators, companies can protect infrastructure before it ever falls victim to an attack. This helps security specialists within the organisation predict what could happen based on accurate data and makes the tasks of ransomware authors and attackers much more difficult and less lucrative. In the absence of an international legal cyber-deterrent, these methods of proactive defence are the most effective way to disrupt the booming ransomware economy. For more information, please visit: www.carbonblack.com. SST
March / April 2018 • Security Solutions Today
71
SECURITY FEATURE
MAKING THE
t e n r e Int s g n i h T f o
A SAFER PLACE FF By Gemalto
T
he Internet of Things (IoT) is set to make a greater impact on society than earlier digital revolutions. As with all new technology there are challenges – with IoT, breaches of security and privacy have the potential to cause most harm. This is why devices and data need security by default.
Manufacturers from a wide array of industries are attracted to the potential of IoT to address key business consumers, including:
•
The World of Possibilities Depends on Trust Imagine a future where connected devices surround us, saving time, boosting our wellbeing, improving our health and making our workplace more productive. From Amsterdam to Zanzibar, connected devices will be transforming the world around us. Improving the efficiency of our homes, making our roads safer, encouraging us to live a more active lifestyle. IoT builds upon the mass adoption of the Internet, mobility and social media technologies, and is fuelled by a need to make our world a more productive, healthier and safer place to live. Consumer device and industrial equipment manufacturers, automotive firms, service businesses, network and software developers are constructing a vast IoT ecosystem populated with smart, connected devices.
72
Security Solutions Today • March / April 2018
•
•
Cut the costs of delivery or maintenance of an object. General Electric, for example, uses IoT for predictive maintenance in jet engines to predict faults before they grow into big ones. Tracked flight data is also used with the goal of cutting fuel costs and improving efficiency. An opportunity to create new revenues from valueadded-services (VAS) and innovative business models like Product-as-a-Service (PaaS). Rolls Royce’s Power-by-the-Hour approach, for example, allowed operators to pay a xed sum per ying hour rather than paying for the engine up-front. Improve the customer relationship, particularly for manufacturers who traditionally have no relationship with users once a device has been sold. Intel, for example, is adding ‘brains’ to vending machines which will enable vendors to add 2 for 1 offers, discounts and loyalty programs to increase sales.
SECURITY FEATURE
Building Trust Whether it’s to cut costs, generate new revenues or have a better understanding of customers, the business model only works when there is trust between the user and the supplier.
IoT builds upon the mass adoption of the Internet, mobility and social media From a user’s point of view, trust technologies, and is fuelled by depends on a number of factors a need to make our world a more such as the reliability and availability of connectivity. productive, healthier and safer place to From a supplier’s point of live. Consumer device and industrial view, they need to trust that the investment they make in a equipment manufacturers, automotive connected device can be recovered firms, service businesses, network (revenue assurance). But perhaps the most significant aspect of trust and software developers are relates to data privacy and security. constructing a vast IoT Developers need to consider the complete journey of that information when ecosystem populated with designing their connected devices. smart, connected devices. Secure Interfaces Must be Built into Things Data in motion will travel from a host of devices, through diverse networks to different data centers located in the cloud. IoT will not reach its full potential unless users can trust that their connected devices are secure and their privacy is guaranteed. Therefore, data must be secured not only on the device, but on its journey through the network towards the data center and beyond. With so many links in the chain, the security framework must be interconnected and coordinated to avoid breaches, snooping, hacking or accidental leaks. One of the major considerations with IoT is that an object – be it a car, a smart meter or a health monitor – will suddenly become part of a networked environment. Some IoT devices will run our critical infrastructure, such as water, electric, public health and transportation, which will make them a potential target for industrial espionage as well as denial of service (DoS) and other hack attacks. Personal data – perhaps financial records or location history – residing on networks will be an obvious target for cybercriminals. Data in motion must be secured every step of the way. Take the connected car, for example. It may have access to a personal calendar to plan the fastest route to the next meeting. To send information from the incar navigation and entertainment system, provided by the manufacturer, there must be a wireless connection
March / April 2018 • Security Solutions Today
73
SECURITY FEATURE
provided by a service provider. Information is downloaded or sent via a system in the cloud. Basically, a “thing” requires the Internet and cloud to be truly connected to let data flow from one place to another.
Protecting our Privacy Tempted by the array of data that is collected from smart devices, cybercriminals could nd new ways of entering our lives, our homes and our privacy. Privacy, security and trust cannot be an afterthought when designing for IoT. After all these things, in some cases, are collecting highly personal information. Security needs to be baked in from the very beginning to manage this information in motion and control who has access to it. Consider the 2015 Foscam baby monitor hack. A family which used a wireless Foscam IP baby monitor were hacked. The hacker took control of the camera and moved it around, following the mother whilst talking to her and making comments about her child.
74
Security Solutions Today • March / April 2018
SECURITY FEATURE
One of the major considerations with IoT is that an object – be it a car, a smart meter or a health monitor – will suddenly become part of a networked environment. Some IoT devices will run our critical infrastructure, such as water, electric, public health and transportation, which will make them a potential target for industrial espionage as well as denial of service (DoS) and other hack attacks. Personal data – perhaps financial records or location history – residing on networks will be an obvious target for cybercriminals.
This example spotlights the importance of consumer privacy when it comes to the connected world of IoT, where dishwashers can come on automatically when the grid is at its lowest and cars can call emergency services following an accident. Much of the data companies hold about us has, until now, been explicitly and voluntarily provided. But increasingly data collected and transmitted goes beyond personally identifying information and creates a detailed pattern of our everyday lives. Take for example, the smart meter. It collects telemetry data for the utility company, which owns the device, which is analysed to build up a picture of how energy is used. From the consumer perspective, it creates a record of activity within the user’s own home. This data in the wrong hands provides an invitation to break-in when the homeowner is away.
A Double Act: Privacy and Authentication Ensuring the users are who they say they are and authorised to use the device is the essential first step in securing a device. Authentication is essential with connected devices. For instance, when we go to unlock our connected car with our mobile phone we want to know that no-one else can unlock it but cars are not always as secure as you think! Australian security researcher Silvo Cesare has demonstrated a security aw in car locks that enables him to disable the alarm and get into the car without
leaving any evidence behind for police. He uses a simple software defined radio and an antenna to capture and transmit wireless signals to gain entry. Suppliers must also be authorised to access a remote device. Electric vehicle developer Tesla notifies drivers that an upgrade to its firmware is available and when it will be downloaded. This shows the driver that the upgrade has come directly from Tesla and not someone hacking into the system. To further enhance authentication, biometric data such as fingerprints and iris scans are increasingly being used to prove who we say we are.
Threats are Unavoidable With huge amounts of information being generated by connected devices, the focus must shift to protecting data that is meaningful. The first step in creating a security framework is recognising the types of threat. Here are some examples of key threats:
Phishing The fraudulent practice of sending emails pretending to be from a reputable company in order to entice individuals to reveal sensitive information such as credit card numbers.
March / April 2018 • Security Solutions Today
75
SECURITY FEATURE
With so many ecosystem players involved (OEMs, connectivity providers, cloud service providers, ISVs etc) it is paramount that all components and steps in the ecosystem are secured to ensure there are no disruptions. Robust security ensures businesses can benefit from connected business continuity with customers.
App hacking The low hanging fruit in the hacking world. There are automated tools easily available on the market and lots of them are free. Unlike centralized Web environments, apps exist in an unregulated mobile device ecosystem. Unprotected binary code in mobile apps makes them fast and easy to modify and exploit. Binary code is the code that devices read to make an app work. It is basically what you download when you access mobile apps in an app store such as iTunes or Google Play.
DOS Attacks Denial of Service attacks are designed to temporarily or indefinitely crash a network. Fixes are available, but like viruses, hackers are continually thinking up new ones.
DDoS Attacks Distributed Denial of Service attacks are designed to make an online service unavailable by ooding it with traf c from multiple sources.
Physical Intrusion Hacking normally happens remotely but a physical intrusion is when a device and its components are actually tampered with.
76
Security Solutions Today • March / April 2018
Every Device You Can Think of Can Be Hacked The more devices and points of entry there are on a network, the more opportunities there are for cybercriminals to sneak in. Virtually every connected device from smart TVs, tness devices and home security to printers, in-car systems and networked lightbulbs, has been hacked at some point. IoT is unprecedented in its capacity and scale. To accelerate innovation and acceptance, information between the device, the network and the cloud must be as secure as possible in the face of growing security challenges. Building security into the IoT ecosystem makes authentication a straightforward, frictionless process for the consumer.
Realising the Benefits of A Totally Connected World Consumers will be increasingly drawn to the convenience of IoT, safe in the knowledge that it is secure. It will also enable IoT to deliver on its other promises including increased efficiencies across industries, cost savings in healthcare and energy saving in our cities.
SECURITY FEATURE
The benefits of a secure and trustworthy IoT system to business Lower operating costs for business. ThyssenKrupp Elevator maintains over 1.2 million elevators worldwide, for example. Predictive and pre-emptive maintenance, bringing Microsoft IoT technologies, is guaranteeing a higher uptime on elevators and the company said it has started to see a fall in support calls.
Less Legal Action and Associated Costs from Data Breaches According to research by IBM and the Ponemon Institute the average total cost of a data breach to a company is $3.79 million. Shoring up security reduces risk.
More Opportunity to Partner IoT will open up markets and provide more opportunities to partner. Google, for example, has been working on software that will help automakers build self-drive cars.
Business Continuity With so many ecosystem players involved (OEMs, connectivity providers, cloud service providers, ISVs etc) it is paramount that all components and steps in the ecosystem are secured to ensure there are no disruptions. Robust security ensures businesses can benefit from connected business continuity with customers.
Security Inside and Out Security at the device, network and cloud level are critical to the efficient and safe operation of IoT, protecting data in motion and at rest. Intelligence that enables devices to carry out tasks in the IoT ecosystem must also be tapped into to enable them to recognise and combat malicious threats. Here at Gemalto, we are focused on providing robust security solutions developed for the increasingly complex world these billions of connected “things” are creating. Today’s innovations are only just beginning. IoT will play a pervasive role in how we live and work in the future. But the only way connected “things” will reach their full potential is with the trust of consumers. Gemalto can provide you with a worry free path to IoT adoption, ensuring you stay safe and enjoy the benefits of a truly connected world. For more information, please visit: www.gemalto.com. SST
March / April 2018 • Security Solutions Today
77
SECURITY FEATURE
Smart Cities Present Risks, Opportunities FF By Sylvie Albert
Dean, Faculty of Business & Economics, University of Winnipeg
E
mergent technologies are poised to radically change how we work and live. They will transform our cities and workplaces, shifting jobs and entrepreneurship in new directions, and spur new ways to manage our lives. All of society will be affected, up to and including how we interact with machines themselves. Sophisticated machines and applications that communicate online will accelerate demand for broadband internet and challenge existing information and telecommunication norms.
78
Security Solutions Today • March / April 2018
All of this will require ongoing discussions about security, infrastructure and open-data policy and planning. We now need action. We must move past: “We know it’s coming and have to do something” to “Here is how we can implement and collaborate to make it happen.” As a researcher focused on digitalization of cities for 20 years, I have authored two books and multiple articles. I have led teams of consultants to develop intelligent communities across Canada, and been the chief jurist for the International Intelligent Community Awards for the last 12 years.
SECURITY FEATURE
Here’s why I believe we’re about to start turning these visions into reality:
Robots and AI Robotics and artificial intelligence (AI) will “permeate a large part of our daily life by 2025 and affect most of our industries,” according to the Pew Research Center. We see some of these changes today. Robots already perform tasks as diverse as dispensing frozen yogurt in malls, monitoring rail systems and keeping millions of elevators running smoothly. IBM’s Watson AI technology is used in health care to analyze DNA and help us determine trends and future options for our health. Wearable fitness devices with personal plans link us to team members to set and achieve group goals (I call these personal nagging devices). I have a robot to vacuum my floors (I love it) and I am closely watching the progress of personal robot assistants with amazing capabilities already being showcased around the world. I’d love to have Honda’s ASIMO at my faculty’s front entrance to answer questions and be a tutor for students.
Mobile devices Internet of Things
The number of connected objects — including sensors in cars, wearable devices, electricity and gas meter readers in homes, point-of-sale terminals in businesses and drones — grew 31 per cent between 2016 and 2017, to 8.4 billion devices, according to Gartner analysts. And the number of devices is forecast to grow to 81 billion by 2025, according to IDC research. Demand for sensors in fixed locations such as our homes (security cameras and motion sensors, smart fridges, meter readers, etc.) continue to increase. They save money and labour, and make our lives easier and safer. That volume of devices will give us a lot of data to analyze, which calls for improved policies on security and privacy as mobile sensors monitor our personal spaces and bodies for our activities and health care.
Population,
Urban
and
Of course, Automation Growth technology has good The proportion of the world’s population and bad sides. Drones living in cities is can pose threats to privacy but expected to grow from 54 per cent also have benefits: AT&T uses to 66 per cent them for cellphone service in by 2050, adding another 2.5 billion disaster areas, new four-rotor people to urban areas, the United “quadcopter” drones safely Nations predicts. provide imagery to firefighters We must prepare by creating highand Airbus uses drones quality, sustainable for airplane safety communities through and smart use of technology. inspections.
Over the next five years, more than a million new mobile broadband subscribers will be added per day worldwide, Ericsson’s 2017 mobility report estimates. More people have multiple mobile phone subscriptions, and more will choose mobile instead of conventional wired, landline phones. Desktop computer demand is now flat in contrast to growing demand for tablets, laptops, drones, smartphones and other mobile gadgets, causing broadband internet subscriptions to increase exponentially. This will strain our broadband infrastructure as we expand the Internet of Things, in which every object has a wireless chip that connects it to everything else.
For example, we’re finally seeing more telework or home-based work. This has been possible for 20 years but slow to take hold, mostly due to our desire to hang on to old paradigms despite an increasing proportion of knowledge workers. Telework can limit stress on roads, families and result in decreased operating costs while lessening our carbon footprint. AT&T’s predictions for automation, growth and change are staggering. Tasks performed by bots grew 200 per cent over the past year and are expected to triple this year. This could be scary for cities that are job creators, but bots could also improve quality of life, acting as personal robot assistants. Of course, technology has good and bad sides. Drones
March / April 2018 • Security Solutions Today
79
SECURITY FEATURE
can pose threats to privacy but also have benefits: AT&T uses them for cellphone service in disaster areas, new four-rotor “quadcopter” drones safely provide imagery to firefighters and Airbus uses drones for airplane safety inspections. These applications can be extended to communities and to meet industrial challenges in many sectors. Cities concentrate talent, which will bring new innovations, and we will need them to deal with the negative effects of expanding cities and the side-effects of increased technology use. These trends suggest a third industrial revolution. Are our infrastructure and policies ready for it, and our industries prepared to innovate?
Are we ready for the future? The Conference Board of Canada identified lags in innovation, with Canada ranking 13 out of 16 in our peer group of industrialized countries. Much of that evaluation was based on our use of information and communication technologies (ICT), the main element in the next wave of change. Clearly, we can do better. Canada must evolve its policies if it’s going to develop new entrepreneurial ventures, infrastructure and help its citizens to adjust to the changes while sustainably managing our cities.
80
Security Solutions Today • March / April 2018
That volume of devices will give us a lot of data to analyze, which calls for improved policies on security and privacy as mobile sensors monitor our personal spaces and bodies for our activities and health care.
SECURITY FEATURE
This isn’t only a government responsibility. It requires leadership at all levels that collaboratively plans for efficient, effective and safe use of automated systems such as artificial intelligence, the Internet of Things, driverless cars and more. For example, at least 33 U.S. states have passed or are considering driverless-car legislation, and Michigan had its first driverless pizza delivery in a public-private partnership with MCity. In Europe, Eindhoven already has driverless buses, and fleet transport trucking will be among the first to use the technology. Some technologies and applications will evolve on their own, as Uber did, but others will need concerted planning and action to flourish. Some of the most interesting machine-learning applications will only be successful if we’re more open to sharing data. As a society, that’s been difficult. Canada has some of the world’s toughest spam regulations (CASL), which limits our ability to use data. Most of our data is in private databases with little open access.
International Leadership Canada has been a leader throughout the short
history of digitalization, with pilot projects in every province as early as the mid-‘90s to demonstrate what smart communities could look like. Despite a lack of a strong national agenda, Canadian communities have punched far above their weight, receiving international awards from the Intelligent Community Forum every year since 2002. Now, new federal leadership and initiatives promise to reignite a Canadian vision of digitalization. Ottawa recently announced a Smart Cities Challenge that could help the country improve and innovate along with technology accelerator programs and geographic “technology superclusters.” These initiatives support researchers and entrepreneurs in next-generation fields such as quantum computing, optics and materials in Waterloo. That’s good news for Canada and an opportunity to mobilize a quadruple helix of stakeholders (academia, governments, private sector, consumers) to innovate. *This article was used with permission granted by: www.theconversation.com. SST
March / April 2018 • Security Solutions Today
81
SECURITY FEATURE
Video e c n a l l Su r v e i Trends TO WATCH OUT FOR IN 2018 FF By Š 2017 IHS Markit
N
82
ew findings from a report that we have just released show that it is easier than ever for criminals to extort money from victims through ransomware. Our report, The Ransomware Economy, found that the market from this insidious form of malware is now worth an estimated $1 billion.
Despite this increase in demand, the average price of cameras and other video surveillance equipment will continue to fall quickly. As a result, IHS Markit is forecasting that in terms of US dollar revenues the world market for video surveillance equipment will grow at an annual rate of less than 6% in 2018.
Demand for professional video surveillance cameras has been growing quickly and is forecast to continue growing in 2018. It is estimated that less than 10 million surveillance cameras were shipped globally in 2006. This grew to over 100 million in 2016. It is forecast that over 130 million will be shipped in 2018.
It will be challenging for vendors to continue to grow revenues and margins, but there will be opportunities for well -placed vendors. For example,the South East Asian and Indian markets are both forecast to grow at higher than average rates. There is also great potential for the next generation of products powered by technologies like deep learning and cloud computing.
Security Solutions Today • March / April 2018
SECURITY FEATURE
The A to I of Video Surveillance Terminology By Jon Cropley
The past 12 months has seen a range of new terms becoming regularly used in the video surveillance industry. AI (artificial intelligence)-computers being able to perform specific tasks as well as or better than human intelligence. In the context of video surveillance,AI is used in the field of computer vision to classify visual images and patterns within them.
It will be challenging for vendors to continue to grow revenues and margins, but there will be opportunities for well -placed vendors. For example,the South East Asian and Indian markets are both forecast to grow at higher than average rates. There is also great potential for the next generation of products powered by technologies like deep learning and cloud computing.
Big data –huge amounts of different information being stored, organised and analysed by computers to identify trends, patterns, and relationships. In the context of video surveillance, the data could be metadata describing hours of video surveillance footage combined with other data sources to highlight patterns relating to security or business operations. Cloud computing –instead of using a local server to store or manage video surveillance data, using a network of internet-connected remote servers. Generally this network has the ability to provide additional resource if and when required from a larger available pool. The available resource may be clustered into a data center or network of datacenters. These may be private (entirely or partly owned for exclusive useby specific organisations or public (resource accessible to multiple separate users). Deep learning –a branch of machine learning and subset in the field of AI. Deep learning makes use of algorithms to structure high-level abstractions in data by processing multiple layers of information, emulating the workings of a human brain (a neural network). Edge computing/storage - performing data processing and analytics/storage closest to the source of the data (normally, in this context, in a video surveillance camera).
March / April 2018 • Security Solutions Today
83
SECURITY FEATURE
Face recognition –when a video surveillance system can automatically match a person’s face against a database of individuals. GPU (graphics processing unit) - A programmable chip specialised for use in image processing. Due to the requirement to be able to simultaneously processing multiple large data blocks required in modern image processing GPUs have been found to be highly suitable for deep learning/neural network processing. H.265 – (or MPEG-4 part 2) is a video compression codec standard approved by the International Telecommunications Union (ITU-T). Compared with H.264, H.265 has the potential to use 30 – 40% less bandwidth for a video stream of the same quality. IoT (the Internet of things) – IoT is not a specific device or technology – it is a conceptual framework, driven by the idea of embedding connectivity and intelligence in a wide range of devices. IHS Markit defines an IoT device as a device which has some form of embedded connectivity that allows the device to be directly connected to the internet (i.e. IP addressable), or allows the device to connect (tether) to an IP addressable device. In the context of video surveillance, this could be using video surveillance data with other sensors or sources of information.
Drone detection technologies By Oliver Philippou
The use of drones has emerged as a very real problem for perimeter security. For would-be intruders or unwanted observers using drones, the issues suffered by the commercial market do not apply. Consumer drones are readily available for just a couple of hundred dollars and flown by anyone with no prior training and without a license. Thus the problem of drones in restricted airspace, such as near airports, critical infrastructure facilities, or above sports stadiums full of spectators, has become an increasing concern.
84
Security Solutions Today • March / April 2018
SECURITY FEATURE
As video surveillance is being leveraged for multiple uses beyond just security the perceived value of video surveillance data is increasing. This value can sometimes be measured with incurred costs if data becomes unavailable. This may be a direct cost (e.g. a fine from an authority) or an indirect cost (e.g. lack of data for business operations, hampering productivity).�
Given the large physical area that these restricted airspaces cover, simply being able to identify that a drone is nearby has proven challenging. However, IHS Markit expects that recent developments in drone detection technology mean that in 2018 anyone wanting to secure a perimeter will have to take into account the threat from above. There are currently two main drone detection technologies: Radio Frequency (RF) detection aerials: These products are used to detect, analyse, and locate the RF used by the drone base station to communicate with the drone. The benefits of RF detection aerials are that they can detect and locate both the drone in the air and the person controlling the drone, in some instances even before the drone takes off. RF aerials are also able to detect over a much greater range than radar or video surveillance cameras. Additionally, RF aerials can potentially even interfere with the communication between the drone and the controller. However, doing this can have unknown effects, such as the drone dropping out of the sky. The problem with RF aerials is that they are not particularly accurate at providing a specific location, nor are they able to provide video verification of a drone. Radar: Ground surveillance radars are used for low-level aerial surveillance to detect and track small drones. They use a similar technology to air traffic control radar, but on a smaller scale, providing a shorter operating range
than RF aerials. However, radar is significantly more accurate than an RF aerial, and therefore is well-suited to be paired with video surveillance cameras including PTZ cameras automatically to zoom in and follow targets. The downside of radar is that performance can be impacted by adverse weather (for example rain, snow, sand or dust). Radar-based drone detection systems tend to be more expensive than RF aerial systems. Video surveillance alone is not considered an adequate detection technology. Object detection analytics can be used on a video surveillance camera for video verification and capturing a visual image of the potential threat. However, both RF aerials and radar can detect beyond the line of sight and have nearly a 360-degree field of detection. Therefore many vendors are finding that combining all three technologies together offers the best chance of drone detection. The use of video has an important role to play in this emerging field of perimeter security.
Video Surveillance Fault Tolerance By Josh Woodhouse
The ability of a video surveillance system to tolerate faults while maintaining operation with minimal disruption is seldom discussed. No one likes to plan for the worst, yet even though the video surveillance industry is increasingly utilising enterprise grade IT technology, many video surveillance systems still have fairly limited fault tolerance and failover capability.
March / April 2018 • Security Solutions Today
85
SECURITY FEATURE
When compared with what is common in the IT industry, the video surveillance industry is often thought of as having a relaxed approach to many aspects of failover and redundancy. However, as the multiple uses and perceived value of video surveillance data is increasing we may see increased demands for greater failover, redundancy and backups from end-users. Surveillance systems which do have a high level of fault tolerance tend to focus on mitigating failure after video is captured by a surveillance camera. This is due to a higher impact of failure from the “back-end” rather than at an individual camera. For example, if an individual camera fails, the impact is smaller than if the recording server or storage system fails which may cause the loss of all past and future video recordings. As video surveillance is being leveraged for multiple uses beyond just security the perceived value of video surveillance data is increasing. This value can sometimes be measured with incurred costs if data becomes unavailable. This may be a direct cost (e.g. a fine from an authority) or an indirect cost (e.g. lack of data for business operations, hampering productivity). Cost analysis can form the basis for evaluating potential investment into additional levels of failover, redundancy and backups for video surveillance systems such as:
• •
Additional hardware costs (e.g. redundant servers / storage) Additional software costs (e.g. virtualisation or mirroring software licenses).
An interesting example of where we’ve observed increased levels of failover and redundancy is in legalised marijuana supply in the USA. Facility owners are investing more in higher levels of failover in their surveillance systems to ensure they do not fall foul of stringent legislation in some states. This legislation focuses on the ability to retain and produce past video recordings when demanded by authorities. Failure to comply can have dire consequences including loss of business licenses. In other industries, for example manufacturing, as video becomes more ingrained in business operations we are likely to see similar patterns of investment for greater failover in video surveillance systems.
86
Security Solutions Today • March / April 2018
Several video surveillance analytic solutions for forensic video analysis have been available for some time, yet, the improvement in accuracy in the last 18-24 months using deep learning technology has been critical. This advancementhas pushed accuracy to a level of competency that can be reliable enough to assist human analysts.
SECURITY FEATURE
Forensic Video Analytics as A Service By Josh Woodhouse
When reviewing video for investigations one of the biggest challenges is the sheer volume of video footage which may need to be examined. It’s said that typically it may take a trained officer or analyst using traditional methods (a notepad and the pause/rewind buttons) 1.5 -2 hours to review just an hour of raw video footage. This can be a huge consumer of resource. The problem is particularly prominent in police forces where the issue is amplified by a combination of budgetary constraints and a spike in the amount of video inputs (increased use of body worn cameras and more publically submitted videos). There have long been grounds to find a more efficient solution. Several video surveillance analytic solutions for forensic video analysis have been available for some time, yet, the improvement in accuracy in the last 18-24 months using deep learning technology has been critical. This advancement has pushed accuracy to a level of competency that can be reliable enough to assist human analysts. However, deploying this technology can prove expensive for police departments. At present there is a significant hardware cost required to run this type of video analytic and many of the potential clients are not managing live cameras but instead looking for a tool to search through the repository of potential evidence they have collected from multiple sources in many formats. Some providers have offered use of their
analytics and software packages in a “as a service model” where police forces or agencies can utilise the vendor’s onsite infrastructure and internal analysts to outsource their forensic video analysis. Moving this model to a cloud platform is an obvious evolution where by following some training clients can use ondemand forensic video analytics for particular cases remotely with their own analysts without large hardware investment. This is an exciting prospect for some smaller forces, which may not have the available capital for their own infrastructure or a large enough case load to justify a large capital expenditure. For large agencies and police departments with either highly sensitive data and/ or large caseloads their own onsite infrastructure will most likely be the most cost effective solution. IHS Markit expects that forensic video analytics will be integrated into existing cloud services. For example in the body-worn camera market many police forces already utilise the cloud to store and review body-worn video, yet, in these repositories we still see a degree of separation from other video sources, for example from fixed (public or private) video surveillance. In 2018 IHS Markit expects to see increased convergence in post recording video repositories where, even if only on case by case basis,multiple sources of video will be brought together to be investigated using deep learning video analytics for which cloud may be an important enabler for on demand requirements. For more information, please visit: www.cdn.ihs.com. SST
March / April 2018 • Security Solutions Today
87
SHOW PREVIEW | IOT ASIA 2018
IoT Asia 2018
21 – 22 March 2018 Singapore Expo, Singapore
T
he APAC is said to be the largest region for the development of Industrial Internet of Things Market during 2015-2020 due to the high demand for technology as a result of rapid industrialisation in countries like Japan, China and India which are all spearheading the movement for innovators in this digitalised era. As such, there is no other timing more ideal than now for IoT Asia 2018 which will be held in Singapore at the Singapore Expo from 21 – 22 March 2018. The conference and exhibition showcasing all things IoT is back this year for a second run and visitors can expect an exhilarating line-up of exhibitors as well as events. IoT Asia aims to provide a neutral platform for technology influencers to discuss the latest trends and challenges within the industry, which fits in perfectly with the country’s move towards establishing itself as a SMART Nation. Visitors can look forward to over 500 IoT products and solutions, 30 + networking and interactive hours and over 25 seminars at the TechSpace. The event which will be attended by over 6000 Senior Executives looks to be an exciting one indeed. Building on the success of its IoT Asia series, there are now plans to address IoTrelated challenges and identify real-world opportunities to drive Asia’s connectivity agenda.
88
Security Solutions Today • March / April 2018
IOT ASIA 2018 | SHOW PREVIEW
“IoT Asia aims to provide a neutral platform for technology influencers to discuss the latest trends and challenges within the industry, which fits in perfectly with the country’s move towards establishing itself as a SMART Nation. Visitors can look forward to over 500 IoT products and solutions, 30 + networking and interactive hours and over 25 seminars at the TechSpace.”
The exhibitor profile for this year’s show consist of various segments including SMART Cities, Industrial IoT, Enablers and IoT Data Analytics. The technology on display promises to intrigue and comprise of that futuristic appeal that visitors and others can look forward to. These include Artificial Intelligence, Cyber Security, SMART Homes, Wearables, Drones, Robotics and even visual analytics. For this year’s conference, each of the 2 days will be dedicated to two sectors of the Internet of Everything. On the first day, the focus will be on SMART Cities commencing with a Speech by Singapore’s very own Minister for Foreign Affairs and Minister-in-Charge of the Smart Nation initiative – Dr Vivian Balakrishnan who will be welcoming visitors as well as speaking on the evolution of Singapore towards a digital society and economy. This will be followed by keynote sessions and dialogue sessions between leaders. The second day of the conference will focus on industrial IoT with a lineup of thought provoking dialogue and keynote sessions on topics such as Artificial Intelligence and its impact on businesses as well as the latest developments in quantum computing. Speakers featured this year include industry leaders such as Bosch’s Oliver Meili who is the Head of IoT Development and Operations, Jim Morrish the Head of Strategy and Partnerships at Nokia WING and many more. Other speakers include Hannes Sjoblad the Biohacker and Chief Disruption Officer of Epicentre Stockholm and Dr Claus Habfast the Municipal Councillor and Vice President of the Greater Grenoble City Area in France. The event will also feature an International Advisory
Panel (IAP) comprising of leading field practitioners, industry veterans and thought-leaders who inform, influence and reflect key interests and issues prevalent in the IoT ecosystem. Representing perspectives from traditional and IoT industry segments, associations, industry consortia, research, think-tank and design communities, academia and government agencies, the IAP advises the IoT Asia team on IoT developments and trends, and serves as a sounding board on relevant initiatives. The Internet of Things adds an entirely new dimension to transform governments, businesses and societies and advancing humanity in ways we cannot yet imagine. Since 2014, IoT Asia has been a key industry platform for governments, industry and technology leaders to foster closer partnerships and create opportunities for the public and private sectors to embrace the Internet of Things. IoT Asia 2018 will highlight key areas critical to the development and the future of Internet of Things in Asia. For more information, please visit: www.internetofthingsasia.com sst
March / April 2018 • Security Solutions Today
89
We have made it easier for you to read on your phone!
Download Tradecards Global mobile application to browse and read our current and past issues of
App features include • Digital issue browsing • Industry news update • Events update • Organisation listings and more...
VISIT
OUR
WEBSITE
AT
www.tradecardsglobal.com
INTERSEC 2018 | SHOW REPORT
Intersec 2018
21 – 23 January 2018 Dubai International Convention and Exhibition Centre
Intersec 2018 Concludes in Dubai with All Eyes on Exciting Future AI and robotics take centre-stage with new technologies changing security, safety and fire protection landscape
D
ubai, UAE - The latest trends in artificial intelligence and robotics in policing societies, along with major projects fuelling growth in the Middle East commercial security landscape, were among many talking points, as Intersec concluded its 20th edition in Dubai on 23 January 2018. The world’s leading trade fair for security, safety, and fire protection featured 1,337 exhibitors from 59 countries, while 29,532 visitors from 129 countries stopped by the Dubai International Convention and Exhibition Centre. Sharing centre-stage were dozens of product launches, while live demonstrations of fire protection equipment and drones used across a wide range of applications kept thousands of buyers and industry professionals entertained and informed. The Dubai Police is one of Intersec’s long-standing Government Partners, along with the Dubai Civil Defence, Dubai Police Academy, the Security Industry Regulatory Agency (SIRA), and for the first time in 2018, the Dubai Municipality. This year from its exhibition stand, the Dubai Police had a strong focus on Artificial Intelligence (AI) and smarter technologies to keep residents, visitors, and
communities safe. It also showcased Robocop prototypes and new smart services that are already in place in its fully automated smart police station, which recently opened in September 2017. Brig. Khalid Nasser Al Razooqi, Dubai Police’s Director General of Artificial Intelligence, gave an overview of the Government body’s vision toward using AI and robots in policing and protection. “The Dubai Police has a target to be the smartest police force in the world, and we’ve been working on a new strategy based on AI that will ultimately increase the happiness of our residents and build Dubai to be the safest city in the world,” said Al Razooqi.
March / April 2018 • Security Solutions Today
91
Fax your order today +65 6842 2581
Subscription Form
I n t e r i o r
D e s i g n
•
L a n d s c a p i n g January / February 2018
ALL NEW LOOK & CONTENT!
The Warehouse Hotel Singapore ARCHITECTURE + INTERIOR Angioino Castle in Apulia; Architectural Heritage Awards (AHA) 2017 winners & 2017 UNESCO Asia-Pacific Awards for Cultural Heritage Conservation winners ARCHITECT’S CORNER Interviews with the Green Architect of the Year award winners in Singapore
Download our new Tradecards Global App on iOS and Android to read the latest issue!
SINCE 1974
Middle East
S$170.00
Southeast Asia Construction
1 year (6 issues) Singapore S$45.00 Malaysia / Brunei S$90.00 Asia S$140.00 America, Europe S$170.00 Japan, Australia, New Zealand S$170.00 SINCE 1994
Security Solutions Today
1 year (6 issues) Singapore S$45.00 Malaysia / Brunei S$90.00 Asia S$140.00 America, Europe S$170.00 Japan, Australia, New Zealand S$170.00
The Robotic Revolution Cover Focus
Security Features
In Focus
Steve Reinharz Introduces AI
From Nature to Future: E-motion Butterflies & Ro-bats
The Man Behind the Robot: OTSAW O-R3
Download our new Tradecards Global App on iOS and Android to read the latest issue!
SINCE 1992
Middle East
S$170.00
1 year (6 issues) Singapore S$45.00 Malaysia / Brunei S$90.00 Asia S$140.00 America, Europe S$170.00 Japan, Australia, New Zealand S$170.00 Middle East
Oct - Dec 2017
•
Bathroom + Kitchen Today
A r c h i t e c t u r e
SURFACE SPACES Bring On The Colours
KITCHEN SPACES Build Your Own Kitchen
COVER STORY
SINCE 2001
Lighting Today
Southeast Asia Building
(Please tick in the boxes)
OCTOBER - DECEMBER 2017
COVER STORY
Revel Casino New Jersey, USA
INSIDE
Show Previews / Reviews · Smart Lighting · Lighting for Facades + Landscapes · Lighting for Interior Spaces
SINCE 2002
1 year (4 issues) Singapore S$32.00 Malaysia / Brunei S$65.00 Asia S$80.00 America, Europe S$130.00 Japan, Australia, New Zealand S$130.00 Middle East
S$130.00
1 year (4 issues) Singapore S$32.00 Malaysia / Brunei S$65.00 Asia S$80.00 America, Europe S$130.00 Japan, Australia, New Zealand S$130.00 Middle East
S$130.00
IMPORTANT Please commence my subscription in ______________________________ (month/year)
S$170.00
Personal Particulars
NAME: POSITION: COMPANY: ADDRESS: TEL:
FAX:
E-MAIL: Professionals (choose one): Architect
Landscape Architect
Interior Designer
Developer/Owner
Property Manager
Manufacturer/Supplier
Engineer
Others
I am sending a cheque/bank draft payable to: Trade Link Media Pte Ltd, 101 Lorong 23, Geylang, #06-04, Prosper House, Singapore 388399 RCB Registration no: 199204277K * GST inclusive (GST Reg. No: M2-0108708-2)
Please charge my credit card (circle one): Amex / Diner’s Club Card Number:
Expiry Date:
Name of Card Holder:
Signature:
INTERSEC 2018 | SHOW REPORT
“Among the new features at the 20th edition of Intersec was an indoor Drone Zone, along with two dedicated conferences on Drones and Artificial Intelligence. Greg Agvent, Senior Director for CNN Aerial Imaging and Reporting, spoke at the Intersec Drones Conference about the potential uses for drones in information gathering.”
“We plan to use AI to help us not only reduce crimes, but increase our ability to predict potential crimes before they happen, along with reducing traffic accidents. We’ve introduced a crime prediction system as well as accident prediction system that can study the behaviours of drivers. “With UAE car manufacturers, we’ll install sensors to study the behaviour of drivers and see how we can teach them the best way to
drive. Vehicles will instruct police where they should cover based on data we have, and perhaps where there is crime.” Al Razooqi said Dubai Police plans to open another eight Smart Police Stations in 2018, and while AI and robots will in the future take over more routine daily jobs, that won’t mean less ‘human’ manpower: “There have been rumours that due to AI and robotics at Dubai Police, that there will be less police
officers but this is not true,” he added. “We’re going to create more advanced positions, where they can provide a better service to keep our residents and visitors happy and safe.” Among the new features at the 20th edition of Intersec was an indoor Drone Zone, along with two dedicated conferences on Drones and Artificial Intelligence. Greg Agvent, Senior Director for CNN Aerial Imaging and Reporting, spoke
March / April 2018 • Security Solutions Today
93
SHOW REPORT | INTERSEC 2018
at the Intersec Drones Conference about the potential uses for drones in information gathering. Agvent said that drones can be effective to not only deliver new perspective of journalism and reporting, but can also be important tools for data capture that can have much wider implications: “We’re still at the very beginning of acknowledging what drones can do,” said Agvent. “Right now, almost exclusively, we’re working with video, but what about thermal imaging and forward looking infrared, and what context and understanding can this add to a story? “If we we’re covering search and rescue operations, what other sensors can we input? If we’re doing a story on drought, can we put a hygrometer on a drone and create data that supports the video story? There’re all sorts of opportunities for sensors to add new layers and context.” Agvent said that Middle East Broadcasters wishing to utilise drones need to engage with their respective civil authorities and manufactures, adding: “That’s what’s so important about events like Intersec. “It brings people together, where professionals from a wide range of sectors can gather to understand about the latest technologies, regulations, and industry-best practice in an area that is on a highgrowth trajectory. We can’t do this alone. Operators, regulators and manufacturers aren’t going to solve the equations by themselves.” Organised by Messe Frankfurt Middle East, Intersec spans seven show sections of Commercial Security, Fire & Rescue, Safety & Health, Homeland Security & Policing, Information & Cyber Security, Smart Home & Building Automation, and Physical & Perimeter Security.
94
Security Solutions Today • March / April 2018
INTERSEC 2018 | SHOW REPORT
With 483 exhibitors in 2018, Commercial Security represents the largest show section, and features two-thirds of the world’s top 50 providers of video surveillance, access control, intrusion detection, analytics, and video management software. Intersec has proved over the years to be a fruitful business platform for global leaders and industry start-ups alike. Korean company IDIS has exhibited for the past several years, and has watched its projects and partnerships in the Middle East expand significantly as a result of contacts established during the show. “We’ve expanded our partner network with many due to the success of exhibiting at Intersec from 2015 to 2017,” said Harry Kwon, General Manager for IDIS in the Middle East and North Africa. “We’ve established new end-user customers and struck up strategic partnerships such as with G4S in Egypt and Saudi Arabia as a direct result of Intersec, with a number of projects now complete or underway. “We were first introduced to Al Sulaiman Security Systems and Services (A4S) at Intersec two years ago and since then IDIS MENA has struck up a strategic alliance with A4S with the partnership paying dividends. Both companies are now working on 150 leads and ten live projects. And we’re thrilled to announce at Intersec 2018 our project with Al Sulaiman Jewellers, that comprises 100 IDIS camera solution across 18 branches as well as offices,” added Kwon. Meanwhile, Germany’s DoorBird was one of more than 30 companies in Intersec 2018’s fast-developing Smart Home and Building Automation section. A debut exhibitor in 2017, DoorBird returned this year to showcase the 2nd generation of its IP Video Door Station. Pierre Dinnies, DoorBird’s Key Account Manager said the 2nd iteration was developed specifically to handle extreme Middle East conditions, enabling
users to access their home’s video intercom via their mobile device and DoorBird App anywhere in the world, in real-time. “DoorBird is the fastest IP intercom system in the market at this time. That means if a visitor rings a bell, it takes two seconds for the user to be notified anywhere in the world via their mobile device,” said Dinnies of DoorBird, which was launched in 2015. “It’s a bi-directional videoaudio, so users can converse with visitors real-time.” “Users can also programme DoorBird so that it automatically locks and unlocks at designated times, allowing access to homes if required, for example, cleaning or maintenance companies. Everything is recorded and it can be integrated with existing home automation and security systems, so the opportunities are endless. Of Intersec, Dinnies added: “We were very impressed with Intersec last year, and we met a lot of interesting people, so that’s why we decided to participate again in 2018. We need to meet consultants, integrators and installers and that’s who we meet here, from Germany and Vietnam and everywhere in between. It’s been a perfect show again this year.” With 83 percent international exhibitor participation, Intersec’s global footprint was underlined by 15 country pavilions from Canada, China, Czech Republic, France, Germany, Hong Kong, India, Italy, Korea, Pakistan, Singapore, Taiwan, UK, USA, and for the first time in 2018, Russia. UAE participation was also high, growing six percent year-on-year, with 223 exhibitors covering 10,500sqm of exhibition space. Visitors too were happy with the show. Fahad Al Qahtani is Operations Manager at ILT Total Access Control, which specialises in automation and access control
March / April 2018 • Security Solutions Today
95
SHOW REPORT | INTERSEC 2018
“With 483 exhibitors in 2018, Commercial Security represents the largest show section, and features two-thirds of the world’s top 50 providers of video surveillance, access control, intrusion detection, analytics, and video management software.”
systems: “Intersec makes it a lot easier for us to see all relevant suppliers and manufacturers in one place at one time. We’ve seen a lot of interesting products at the show this year.” Waleed Al-Mansour, Executive Manager for Security & Safety Corp in Saudi Arabia, was at Intersec 2018 to gain information about the latest firefighting and security alarm systems, along with CCTV products.
as the world’s premier trade platform of its kind for the security, safety, and fire protection industries. “We’ve had participation from the majority of the world’s foremost safety and security brands and attracted a wide representation of global experts and key influencers to our safety and security forums. Twenty years is a landmark for both Intersec and the region’s standing as a major global security market.
“Intersec is a great opportunity to know what the latest updates in the security, safety, and firefighting business. It’s a great chance for us to enhance our knowledge in the field, and we’re very happy with what we found this year. Every year it adds more to my knowledge in the development of systems relating to security, fire protection, and CCTV. Things are moving so fast and we have to keep updated.”
“We intend to continue to build on our success and look forward to far greater developments and achievements in the future while working together with the authorities and the active support of the government.”
Ahmed Pauwels, CEO of Messe Frankfurt Middle East, said: “Intersec 2018 has further cemented its position
For more information, please visit: www.intersecexpo.com sst
Intersec is held under the patronage of H.H. Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum. The 21st edition will take place from 20-22 January 2019.
ADVERTISERS’ INDEX
96
BMAM EXPO ASIA 2018
19
IFSEC SOUTHEAST ASIA 2018
5
BUILD4ASIA 2018
17
IOT ASIA 2018
1
CHINA SECURITY 2018
11
MICROENGINE TECHNOLOGY
7
COUNTER TERROR ASIA EXPO 2018
13
MORSE WATCHMANS
37
GIGA-TMS 35
PROLIGHT + SOUND GUANGZHOU 2018
IBC
GUANGZHOU PUBLIC SECURITY TECHNOLOGY 2018 15
SECUTECH 2018
3
IFSEC INTERNATIONAL
OBC
ZHEJIANG DAHUA
IFC
IFSEC PHILIPPINES 2018
9
Security Solutions Today • March / April 2018
“
You have to be here if you want to be regarded as a key player in the security market.
“
27,658
79%
£20.7bn
visitors from 116 countries
of visitors come to source new products
total budget of visitors to IFSEC 2017
Enquire about exhibiting at IFSEC 2018: ifsec.events/international
Proud to be supported by: