Page 1

Security & the City Securing SMART Cities of the Future

Cover Focus

Inside Look

IoT & Cyber Security

Securing Smart Cities Through Surveillance

Gartner on Petya & Other Ransomware

World’s First Interactive SMART Building Scan this code to visit our website


HD300 High Security Electronically-Controlled Barrier

High Security Bollard

DSC501

DSC288 High Security

High Security Barricade

DSC600 High Security Shallow Foundation Fixed Bollard

DSC720

Sliding Gate

DSC1200 High Strength Surface Mounted Barricade

DSC207 High Security Shallow Foundation Barricade

DSC2000 High Security Barricade

DSC7000 High Security Beam Barrier

DSC1100 High Strength Portable Barrier

18,000+ Systems Deployed Around the World!

TT207SFM High Security Surface-Mounted Barricade

DSC7500 High Security

TT212 High Strength

TT280 High Security

Beam Barricade

Swing Beam Barrier

Stopping a bomb-laden car and SUV from penetrating the entrance to a consulate to guarding against vehicle assaults at dams, border crossings, court houses, embassies, capitol buildings, palaces, hotels, headquarters buildings and many other types of important facilities, Delta’s bollards, barricades, beams, barriers, gates and guard booths keep vehicles stopped, keeping people and property safe in over 130 countries throughout the world since 1974.

Linear Crash Gate

Go to www.deltascientific.com for full details & specifications. 40355 Delta Lane, Palmdale, CA 93551 1-661-575-1100 info@deltascientific.com


September / October 2017

In this issue 6

CALENDAR OF EVENTS

8

EDITOR’S NOTE

10 55

APPLICATION STORIES Mobile Access Control, parking security & more

56

FUN FACTS The Internet of Threats

73

CASE STUDIES Security in the SMART cities of the future

94

SECURING SMART CITIES Public safety in the SMART society

96

SECURITY FEATURES Video Analytics, Cyber Threats & more

121

ALL ABOUT IOT & CYBER SECURITY Cloud security, Ransomware & more

136

INSIDE LOOK Gartner predicts security tech trends in 2017

142

IN FOCUS Spotlight on SMART cities & Cyber Security with Gartner, Huawei & Siemens

156

PRODUCT SHOWCASE Featuring Bodycams, personal safety devices, biometrics & more

170

2

IN THE NEWS Updates from Asia & Beyond

EDITOR’S AFTERTHOUGHT Securing Cyberspace & Beyond

Security Solutions Today • September / October 2017

COVER FOCUS

52

Securing Smart Cities Through Surveillance

151 SPECIAL PRODUCT FEATURE Dahua goes thermal & launches EPoE IP System

173 POST SHOW REPORT Highlights of INTERPOL World 2017 & Secutech 2017

176


They see city streets that are protected 24/7.

You see smart data that helps to improve public transport. Bosch empowers you to build a safer and more secure world. And with built-in video analytics as standard in our IP 7000 cameras and above, we enable you to use video data for more than security alone. Using collected data to optimize public transport schedules and to improve levels of security. Find out more at boschsecurity.com

+1

People counting

Queuing alarm

Alerts only when needed


September / October 2017

Contact PUBLISHER

Steven Ooi (steven.ooi@tradelinkmedia.com.sg) EDITOR

Melissa Teo (sst@tradelinkmedia.com.sg) RADIO TECHNOLOGY CONSULTANT

Security & the City

Martin Gillmon (martin.gillmon@tradelinkmedia.com.sg)

Securing SMART Cities of the Future

GROUP MARKETING MANAGER

Eric Ooi (eric.ooi@tradelinkmedia.com.sg) MARKETING MANAGER

Felix Ooi (felix.ooi@tradelinkmedia.com.sg) MARKETING EXECUTIVE

Cover Focus

Inside Look

IoT & Cyber Security

Securing Smart Cities Through Surveillance

Gartner on Petya & Other Ransomware

World’s First Interactive SMART Building Scan this code to visit our website

Photo Credit: Pixabay.com Created by Harryarts - Freepik.com Designed by Fawzeeah Yamin

Racheal Chong (racheal.chong@tradelinkmedia.com.sg) HEAD OF GRAPHIC DEPT/ ADVERTISEMENT CO-ORDINATOR

Fawzeeah Yamin (fawzeeah@tradelinkmedia.com.sg) GRAPHIC DESIGNER

Siti Nur Aishah (siti@tradelinkmedia.com.sg) CIRCULATION

Yvonne Ooi (yvonne.ooi@tradelinkmedia.com.sg)

SECURITY SOLUTIONS TODAY

is published bi-monthly by Trade Link Media Pte Ltd (Co. Reg. No.: 199204277K) 101 Lorong 23, Geylang, #06-04, Prosper House, Singapore 388399 Tel: +65 6842 2580 Fax: +65 6842 2581 ISSN 2345-7104 (Print) Printed in Singapore by KHL Printing Co Pte Ltd.

ANNUAL SUBSCRIPTION: Surface Mail: Singapore

- S$45 (Reg No: M2-0108708-2

The magazine is available free-of-charge to applicants in the security industry who meet the publication’s terms of control. For applicants who do not qualify for free subscription, copies will be made available, subject to the acceptance by the publisher, of a subscription fee which varies according to the country of residence of the potential subscriber in the manner shown on the right. The editor reserves the right to omit, amend or alter any press release submitted for publication. The publisher and the editor are unable to accept any liability for errors or omissions that may occur, although every effort had been taken to ensure that the contents are correct at the time of going to press. The editorial contents contributed by consultant editor, editor, interviewee and other contributors for this publication, do not, in any way, represent the views of or endorsed by the Publisher or the Management of Trade Link Media Pte Ltd. Thus, the Publisher or Management of Trade Link Media will not be accountable for any legal implications to any party or organisation. Views and opinions expressed or implied in this magazine are contributors’ and do not necessarily reflect those of Security Solutions Today and its staff. No portion of this publication may be reproduced in whole or in part without the written permission of the publisher.

4

Security Solutions Today • September / October 2017

Incl. 7% GST)

Airmail: Malaysia/Brunei - S$90 Asia - S$140 Japan, Australia, New Zealand - S$170 America/Europe - S$170 Middle East - S$170

ADVERTISING SALES OFFICES Head Office: Trade Link Media Pte Ltd (Co. Reg. No: 199204277K) 101 Lorong 23, Geylang, #06-04, Prosper House, Singapore 388399 Tel: +65 6842 2580 Fax: +65 6842 1523, 6846 8843, 6842 2581 Email (Mktg): info@tradelinkmedia.com.sg

China & Hong Kong

Japan:

Iris Yuen Room 1107G, Block A, Galaxy Century Building #3069 Cai Tian Road, Futian District Shenzhen China Tel : +86-138 0270 1367 sstchina86@gmail.com

T Asoshina/Shizuka Kondo Echo Japan Corporation Grande Maison, Rm 303, 2-2, Kudan-Kita,1-chome, Chiyoda-ku, Tokyo 102, Japan Tel: +81-3-32635065 Fax: +81-3-32342064


®

SPECTRUM

FIBER SOLUTIONS Altronix’s new NetWay Spectrum series takes fiber and power to a new level. Indoor and outdoor models include hardened Ethernet PoE switches and multi-port media converters with or without integral power. Units can be deployed with conventional single or multi-mode fiber...or composite cable which combines fiber with copper to simultaneously deliver power and data. Go further with NetWay Spectrum from Altronix.

MADE IN THE U.S.A. & BACKED BY A LIFETIME WARRANTY

altronix.com – info@altronix.com


CALENDER OF EVENTS

COMING SOON... OCTOBER

Safety and Security Asia 2017

Date: 4 - 6 Oct 2017 Venue: Marina Bay Sands, Singapore Organiser: Cems Conference and Exhibition Management Services Telephone: +65 6278 8666 Website: www.safetysecurityasia.com.sg Email: info@cems.com.sg

SEPTEMBER

IFSEC Southeast Asia

Date: 06 - 08 September 2017 Venue: Kuala Lumpur Convention Centre, Kuala Lumpur, Malaysia Organiser: IFSEC SE Asia Telephone: 6-03-2176 8788 Website: www.ifsec.events/sea Email: tj.tan@ubm.com

World of Safety & Security 2017 Date: 21 - 24 Sep 2017 Venue: World Trade Center Metro Manila Organiser: EXPOS ASIA Telephone: (632) 656 9239 Website: www.wosas.ph Email: inquiries@wosas.ph

Secutech Thailand 2017

China Public Security Expo 2017

Date: 29 Oct - 1 Nov 2017 Venue: Shanzhen Convention and Exhibition Centre, Shenzhen, China Organiser: Futian District Government, Shenzhen Security & Protection Industry Association and CPSE Exhibition Co. LTD Telephone: +86-755-88309123 Website: www.cpse.com.cn Email: overseas_market@cps.com.cn

NOVEMBER ISC East 2017

Date: 15 - 16 Nov 2017 Venue: Javits Centre, New York City, USA Organiser: Security Industry Association Telephone: (800) 840-5602 Website: www.isceast.com Email: inquiry@isc.reedexpo.com

APRIL

DECEMBER

ISC West 2018

Date: 11 - 13 April 2018 Venue: Sands Expo Center, Las Vegas, Nevada, USA Organiser: Reed Exhibitions Telephone: 2038405602 Website: www.iscwest.com Email: inquiry@isc.reedexpo.com

IFSEC India 2017

Date: 6 - 8 December 2017 Venue: Pragati Maidan, New Delhi, India Organiser: IFSEC Telephone: +91 (0) 11 66517606 Website: www.ifsec.events/india Email: pankaj.jain@ubm.com

JANUARY 2018 Intersec 2018

Date: 21 - 23 Jan 2018 Venue: Dubai International Convention and Exhibition Centre, Dubai Organiser: Messe Frankfurt Middle East Telephone: +971 4 389 4500 Website: www.intersecexpo.com Email: andreas.rex@uae. messefrankfurt.com

6

Date: 16 - 18 Nov 2017 Venue: Bangkok International Trade and Exhibition Centre, Bangkok, Thailand Organiser: Messe Frankfurt Telephone: +66 2 726 1999 Website: www.secutechthailand. tw.messefrankfurt.com Email: jason.cheng@newera. messefrankfurt.com

Security Solutions Today • September / October 2017


Editor’s Note Dear esteemed readers,

T

he warmest of welcomes to the Sep/Oct issue of Security Solutions Today! As always, it is with utmost pleasure that I present you with the latest trends, developments and breaking news in the ever-evolving security sector. Join us as we explore market updates, current events and much more. In this issue, we delve deeper into the digitalisation of the security industry with regards to SMART cities of the future. In the recent years, the focus on security has transcended beyond the physical realm and is now a cause of great concern in the cyber realms as well. With the advent of connected devices fast becoming normalised in society, the phenomenon we refer to as the Internet of Everything has given rise to the demand for SMART security solutions which can offer effective protection in the digital realm in order to safeguard society in the physical world. The world is going online literally and the negative aftermath of this include the recent Wannacry and Petya attacks that left hundreds of thousands of computers crippled worldwide. We present you with articles on securing smart cities of the future as well as highlights on the solutions that are currently in the works to address the safety concerns resulting from digitalisation. Our Inside Look focuses on the latest technologies pertaining to the security industry in 2017. The rise of cyber attacks has given rise to an overwhelming demand for products and solutions that will safeguard society, public infrastructure and organisations from hackers. Companies are evolving accordingly to meet these needs which means security technology is developing constantly. Our Security Features this issue, comprise of a thought provoking line up of articles of how security solutions are being enhanced in order to meet the rising demands of smart cities. On the digital front, we explore the causes and cures of cyber attacks in smart cities then shift the focus to the physical space with Bosh’s innovative brand of surveillance in the retail industry. Also featured is an exciting piece on how Agent Video Intelligence (Agent VI) is utilising Artificial Intelligence (AI) and Video Analytics to safeguard connected cities of today and beyond. As security companies everywhere undergo a digital facelift in order to keep up with society’s evolving security needs, we too at Security Solutions Today are transitioning to include IoT intensive coverage. Making its debut in this issue is a new segment dedicated to digitalisation within the security industry in line with connected devices, Cyber security, AI, robotics and many more. Our Connected World Security section makes its debut with articles on security threats originating within SMART homes, the safety measures companies can implement to safeguard their data from Ransomware and many more. In this issue’s In Focus, we shine the spotlight on Cybersecurity Gurus – Gartner who shed much needed light on the recent Petya and other cyber attacks that have proven to be somewhat of an on-going headache for companies of all sectors and also Huawei who are one of the front runners when it comes to SMART public safety solutions. Like its predecessor Wannacry, the recent Petya attacks were initiated with the sole intention of extortion – of up to $250, 000. Thousands of computers across Europe and the United States became victim to the vicious security breaches including at least seventeen shipping container terminals run by APM Terminals in the Netherlands and other parts of the world. We discuss these matters as well as others on securing the public sphere via efficient cyber protection with Huawei’s and Gartner Analyst Jonathan Care. We conclude this issue with a report on perhaps the most exciting security exhibition this year, INTERPOL World 2017 that served as a platform to connect law enforcement and security companies in addressing the issue of fighting crime in the current era of digitalisation. In line with this, I hope you enjoy my afterthoughts on the digitalisation of the security industry. It certainly is an exciting time for security as the demand for more effective security solutions inspires companies to push the boundaries all in the name of public safety. From security robots on patrol to crowd counters equipped with advanced biometric features. The future is certainly filled with limitless possibilities for the security sector. I certainly hope that this issue is as thought provoking to you as it was to me during the process of compilation. As we move further into the era of all things connected, SST aspires to keep you updated on all the latest developments in IoT and SMART security solutions, in the months ahead.

Melissa T Editor

8

Security Solutions Today • September / October 2017


IN THE NEWS | AROUND THE WORLD

New ABLOY SMARTAIRä Stand Alone Escutcheon Offers Keypad Activation

L

ondon, UK - Security expert Abloy UK has launched an updated version of its SMARTairä standalone intelligent access control system with the addition of keypad functionality, allowing users to quickly and easily program an individual key-code or card on the unit itself. Featuring a simple user interface, the SMARTair keypad controls mean that the unit can be programmed with an additional code or card in less than one minute. Like its predecessor, the new SMARTair escutcheon can be incorporated into existing systems, with the adaptable design making it suitable for a range of installations. The new keypad gives an additional method of entry for users so it’s ideal for use in a range of organisations including hospitals or small offices. The standard package will be made up of three main components – an Abloy EL160 Lock case, an Abloy SMARTair Escutcheon with Keypad Unit, and an ABLOY NOVEL

patented cylinder. Every time the door locks, the EL160 will re-deadlock keeping the door secure, while the SMARTair handle will allow egress from the inside with the outside handle remaining disabled until a valid code or entry credential is presented. The patented cylinder maintains a secure mechanical form of entry at all times. The units will also work with standard MiFare technology,

meaning they can be easily integrated into a PROTEC2 CLIQ system. Stuart Courcoux, Product Manager at Abloy UK, said: “Our SMARTair access control system is already a popular choice for many organisations, but the addition of the keypad activation takes its versatility to the next level. This system is ideal for a number of sectors, including commercial office spaces, healthcare and education facilities.” sst

ASIS International Releases Security and Resilience Standard
New ANSI standard provides systemic, jurisdictional/country neutral approach to manage risk

A

lexandria, Virginia, USA —ASIS International (ASIS) has released a new standard, Security and Resilience in Organisations and Their Supply Chains—Requirements with Guidance (ORM.1) that provides security professionals with an integrated risk-based management systems approach to manage risk and enhance resilience in organisations and their supply chain. ASIS, the leading organisation for security professionals continue on page 12

10

Security Solutions Today • September / October 2017


IN THE NEWS | AROUND THE WORLD

worldwide, is an ANSI Accredited Standards Developer. The ORM.1 emphasizes a proactive, forward-looking approach to risk that supports the pursuit of business objectives and opportunities, as well as a process for prevention, protection, preparedness, readiness, mitigation, response, continuity, and recovery from undesirable and disruptive events. By fully integrating risk management processes throughout enterprise-wide business management activities, organisations will be empowered to make informed decisions based on best available information.   The Standard looks to eliminate “siloing” of risk by using a management systems approach that provides a holistic framework to develop and implement policies, objectives, and programs that consider:   • Context of the organisation and its supply chain • Legal, regulatory, and contractual obligations and voluntary commitments • Needs of internal and external stakeholders

• •

Uncertainties in achieving its objectives Protection of human, tangible, and intangible assets

ASIS Standards and Guidelines Commission Liaison Lisa DuBrock notes the importance of this approach, “…in today’s increasingly complex and unstable global environments, the question is not if the security administrator is called upon to support the full spectrum of the standard, but when.” The ORM.1 replaces two legacy ASIS standards that had been up for review: the ANSI/ASIS Organisational Resilience: Security, Preparedness and Continuity Management Systems (SPC.1) and ANSI/ASIS/BSI Business Continuity Management Standard (BCM.1).     Said DuBrock, “While the SPC.1 emphasized mitigation strategies for security and resilience and the BCM.1 standard emphasised traditional response recovery strategies, the ORM.1 provides an integrated risk-based approach to bring both disciplines together with an added emphasis on supply chain resilience.” sst

Arecont Vision® Compact MicroBullet® Indoor/ Outdoor Day/Night Megapixel Camera Series Now Shipping

L

ondon, UK – Arecont Vision®, the industry leader in  IP-based megapixel camera technology, introduces the new MicroBullet® series of megapixel cameras to the European and Middle East professional surveillance markets. The MicroBullet is an extremely compact and affordable bullet-style camera, yet is loaded with advanced features developed by Arecont Vision. MicroBullet is immediately available, and will be on display in the Arecont Vision stand, F400, at IFSEC International, held at the ExCeL London, UK, June 20 – 22, 2017.   “MicroBullet adds another feature-rich, small form factor camera to the Arecont Vision lineup,” said Brad Donaldson, Vice President Product Development, for Arecont Vision. “MicroBullet is based on Arecont Vision’s advanced camera architecture, and has the outstanding features that our customers expect at a great price. These include a motorized lens, IR illumination, low bandwidth consumption, rapid setup, and cybersecurity protection.” MicroBullet is available in 1080p or 3MP resolutions, each with a remote focus/zoom 2.7 – 8mm motorized lens for easy setup. The camera features an integrated 3-axis mount, yet is only 172.8mm (6.8”) in length and 71.5mm (2.8”) in height, making it ideal for low-profile indoor and outdoor use.MicroBullet features a die-cast aluminum IK-10 impact resistant and IP66 weather rated housing. continue on page 14

12

Security Solutions Today • September / October 2017


WORLD OF SAFETY AND SECURITY EXPO

Supported by www.wosas.ph


IN THE NEWS | AROUND THE WORLD

Arecont Vision SNAPstream™ (Smart Noise Adaptation and Processing) technology is included in all MicroBullet models, reducing camera bandwidth consumption without impacting image quality. MicroBullet offers true day/night functionality, with a mechanical IR cut filter and integrated IR LED illuminators. Select models offer Wide Dynamic Range (WDR) up to 100db at full resolution for use in areas with challenging or varied lighting conditions. These capabilities make MicroBullet ideal for use any time of day or night. Remote focus capability simplifies camera set-up, reducing installation time. The MicroBullet can be quickly installed on a wall, ceiling, or structure with the 3-axis mount used to aim the megapixel sensor at the desired coverage area. Once off the lift or ladder, the installer can select “Short Range Focus” or “Full Range Focus” for rapid setup from the camera webpage. The installer can fine tune the focus and zoom if required by the scene. MicroBullet and all other Arecont Vision cameras run the in-house developed Massively Parallel Image Processing (MPIP) architecture on a Field Programmable Gate Array (FPGA) integrated circuit. All core features and technologies are developed by Arecont Vision, and installed cameras can be upgraded with new capabilities via remote firmware updates, thereby extending the useful life of the device. By employing the unique MPIP architecture, Arecont Vision cameras do not require the use of common embedded operating systems, nor do they make use of 3rd party code or chipsets for core features. This approach eliminates the potential risk of hidden backdoors and the range of other cybersecurity risks widely documented in other camera brands. Arecont Vision cameras are unable to be maliciously repurposed for use in Distributed Denial of Service (DDoS), network penetration, ransomware, and other cyberattacks, or to be used to spread to malware and computer viruses to other network-enabled devices. The MicroBullet series is ONVIF (Open Network Video Interface Forum) Series S compliant. Arecont Vision cameras are integrated with the industry’s leading video management system (VMS) and network video recorder (NVR) choices through the Technology Partner Program and its MegaLab™ test and certification facility. sst

Lane Bess Appointed to be Executive Chairman of Deep Instinct

S

an Francisco, California, USA - Today, Deep Instinct, the first company to apply deep learning to cybersecurity, is pleased to announce the appointment of Lane Bess to the new role of Executive Chairman of the Board. Lane’s background will lend extensive operational guidance. Having led in key roles as CEO and President of Palo Alto Networks, Chief Operating Officer at Zscaler and Executive VP at Trend Micro, Lane Bess brings a wealth of knowledge on how to successfully scale in disruptive and competitive sectors of the constantly changing security technology landscape. Lane Bess joins Deep Instinct at a pivotal point in the company’s development. Through a recent round of funding with strategic investors, Deep Instinct will focus on expansion and success in the U.S. and global markets aimed at maintaining current momentum and

14

Security Solutions Today • September / October 2017

accelerate growth. As Board Chairman, Bess will be instrumental in defining go-to-market strategy while identifying new partners and growth objectives. Commenting on the appointment, Guy Caspi, CEO and Co-Founder of Deep Instinct said, “We are fortunate to have someone with Lane’s depth and breadth of knowledge in the cybersecurity industry join us. We know that Lane’s experience will support the team in disrupting the end-point landscape.” Lane added “I am delighted to be joining Deep Instinct at this exciting stage of its development. With its innovative technology and remarkable growth potential, Deep Instinct is perfectly poised to help redefine how we prevent threats at the end-point and mobile, and make their way deep into the Enterprise network fabric. This is a very talented team and it will be a privilege to contribute to their success.” sst


AROUND THE WORLD | IN THE NEWS

Arecont Vision® Adds BriefCam® to the Technology Partner Program

L

os Angeles, California, USA– Arecont Vision®, the industry leader in IP-based megapixel camera technology, has announced an expansion of the Technology Partner Program by adding BriefCam, the Video Synopsis® Company. BriefCam’s video analytics offering is available in the Arecont Vision MegaLab™ as part of the partnership in support of mutual customers. “A reliable end-to-end video analytics solution has become a must for any player in the security industry today,” said Amit Gavish, BriefCam’s General Manager of Americas. “Arecont Vision’s megapixel cameras, coupled with BriefCam Syndex Pro, enables organisations to analyse huge amounts of video data effectively, achieving safe environments and facilitating proactive management of events.” BriefCam Syndex Pro helps organisations improve security and operations by turning video data into useful information. Based on BriefCam’s Video Synopsis

technology, Syndex Pro allows users to review hours of video in minutes, while applying search filters for achieving accurate results and faster time-to-target. “The innovation that BriefCam has put into their products allows for customers to take advantage of the latest and greatest, best-ofbreed video technology available in the security market”, said Jason Schimpf, Director Marketing Programs, Arecont Vision. “I am very excited to have a company like BriefCam in the Arecont Vision Technology Partner Program as they provide valuable and reliable video analytics to the benefit of our customers.” Arecont Vision megapixel cameras increase situational awareness, reduce both surveillance project costs and installation time and offer unique protection against cyber attacks unmatched by other vendors. Arecont Vision products are the leading single- and multisensor megapixel cameras in the

industry today, having contributed more innovation than any other company. Arecont Vision designs and builds our cameras in America (Buy American Act 41 U.S.C. §§ 8301-305 and FTC Made in USA compliant), and provides award-winning customer support worldwide. Partnering through the Arecont Vision Technology Partner Program with leading video analytics companies such as BriefCam offers more choices to customers for complete solutions. As part of the program, sales, development, and support contacts are established between the two companies to better engage with end users and their systems integrators, test new features and technology, and quickly resolve any support issues. sst

Morse Watchmans Demonstrates Soon to be Available AssetWatcher at IFSEC 2017 Solution Delivers Ultimate Flexibility and Security for a Variety of Applications

L

ondon, England, UK – Among the full line of industry-leading key and asset control products and technologies, Morse Watchmans demonstrated its soon-to-be available AssetWatcher solution at IFSEC. Using RFID technology to track assets placed in or removed from lockers, AssetWatcher is ideal for use in schools, universities, casinos, hospitals

and other high-security applications. “Just like our popular key control systems, AssetWatcher will deliver the high reliability and proven capabilities organisations need to reduce their risk exposure,” said Fernando Pires, VP of Sales and Marketing, Morse Watchmans. “With RFID capability, multiple continue on page 16

September / October 2017 • Security Solutions Today

15


IN THE NEWS | AROUND THE WORLD

configurations and many more features, AssetWatcher delivers the performance and flexibility to meet the asset control needs of virtually any customer and application.” AssetWatcher’s RFID technology uses noncontact wireless radio links to recognize tagged assets. It is compatible with multiple types of RFID tags for use with different types of assets, and features an audible confirmation when a tag has been read. AssetWatcher is able to track multiple items within a locker and can track all types of tagged assets, including electronics and metal objects. Featuring the same reliable and easy-to-use interface as the company’s popular KeyWatcher® Touch, AssetWatcher includes a bright 7” touchscreen and incorporates the MorphoTrak optical fingerprint reader for strong security. At 2.25” high, 14” wide and 8.5” deep, each locker is sized for small laptops, tablets, phones and other objects. AssetWatcher will be available in 10-, 22- or 34-locker configurations in the first quarter of 2017. Additional systems can be easily added as needed to expand the solution to support even more lockers. Each system is designed to be freestanding and can be mounted to the

wall or floor for convenience and stability. A number of modes allow AssetWatcher to accommodate a wide variety of uses. Classic Mode allows the unit to behave and be programmed like KeyWatcher systems, enabling users to be assigned permissions for assets and groups of assets. Classic Mode also allows assets to be returned either to any open locker or to be assigned to a specific locker. Designed around users’ needs, Personal Mode allows assets to be added to the system for tracking, with permissions based on lockers rather than assets. Within Personal Mode are Leased Mode and Owner Mode, providing even greater flexibility. Leased Mode allows users to “lease” a locker temporarily. If a user has no assets in the system, AssetWatcher assigns the user with a locker to store their assets. Once the user removes his or her assets, the locker is deemed to be “free”, and can be assigned to someone else. In contrast, Owner Mode assigns individuals with a specific locker, which may or may not be shared with other users to accommodate shared or specific assets that may be used by one or more persons. sst

Arecont Vision® Expands in Middle East in Support of Increased Sales Growth Across the Region

D

ubai, UAE – Arecont Vision®, the industry leader in IP-based megapixel camera technology, has announced the opening of their new Middle East, Africa, and Indian Subcontinent regional headquarters here in Dubai, United Arab Emirates. “Arecont Vision has experienced tremendous sales growth across the Middle East, Africa, and India,” said Sanjit Bardhan, Vice President, Middle East, Africa, and Indian Subcontinent. “With our new facilities in Dubai, we will be able to provide even better sales and support to all of our customers across the region.” The newly opened headquarters of Arecont Vision LLC (Br.) is located in the Business Park of the Dubai World Central complex in the UAE Free Trade Zone. “The new offices and expansion of our facilities will be of tremendous benefit to our customers who have been increasing across the region,” said Tom Tazey, Regional Director, Middle East. “Dubai provides easy travel and shipping links, and the new facilities will increase our ability to support continued growth.” sst

16

Security Solutions Today • September / October 2017


AROUND THE WORLD | IN THE NEWS

ZingBox Named a 2017 Gartner Cool Vendor for IoT Security

M

ountain View, California, USA - ZingBox, a leading Internet of Things (IoT) security solution provider, today announced its inclusion in Gartner’s May 2017 Cool Vendors in IoT Security report. “ZingBox is the industry’s first and only IoT security solution provider to leverage the individual personalities of IoT devices to provide accurate visibility and protection of an organisation’s IoT assets,” said May Wang, CTO and Co-Founder of ZingBox. “We believe our selection as a Gartner Cool Vendor validates our vision

to protect organizations from both insider threats as well as external cyber-attacks across a wide range of verticals.” The annual Cool Vendor reports evaluate emerging vendors that provide innovative technologies. According to Gartner, “2017 Cool Vendors in IoT security bring notable approaches to software composition analysis, enterprise mobility management and asset discovery.” IoT Guardian, ZingBox’s SaaSbased security solution, leverages machine learning to discover, assess

risk, baseline normal behavior, detect anomalous activities and provide real-time remediation across an organisation’s entire IoT footprint. The patent-pending solution has a deep grasp of each IoT device’s personality, analysing communication to and from every device, watching constantly for deviations in behavior and providing alerts for suspicious behavior. sst

September / October 2017 • Security Solutions Today

17


IN THE NEWS | AROUND THE WORLD

IFSEC 2017: Aurora Unveils Long Range Facial Recognition Sensor Aurora’s FaceSentinel LR expands the operating distance of the company’s world-leading facial recognition sensor technology

H

igham Ferrers, Northamptonshire, England, UK - At IFSEC International 2017, pioneering facial recognition specialist Aurora will unveil its latest next-generation technology development: FaceSentinel LR, a long range sensor that extends Aurora’s industry-leading near infrared capabilities to a wider range of distances, making it suitable for applications such as queue management, surveillance, and VIP identification. The specialist biometric imaging and illumination technology is designed to work with the latest versions of Aurora’s Deep Learning-based Facial Recognition engines. Aurora is established as a world leader in ‘near IR’-based facial recognition, and has logged millions of successful events in applications including time and attendance, airport passenger management and access control. Now FaceSentinel LR uses high speed global shutter technology and a high brightness near IR ceramic flash to deliver a series of HDR still frames to Aurora’s facial recognition engine. Dynamic image analysis provides for adjustment of the illumination to optimise the clarity of a subject’s face in the next frame, repeatable at up to 40fps. Aurora Head of Sales and Marketing Gary James says FaceSentinel LR addresses the issues found in operating facial recognition with visible light CCTV images, a major stumbling block for accuracy in situations where the subject isn’t presenting their face directly to a camera. “This problem has been overcome by integrating the specialist illumination and imaging components in one application-specific device,” James says. “The sensor is highly compact, with very low power consumption, despite its powerful output and processing ability. This extends the operational range of our IR face recognition

capability fivefold, opening up many new applications such as queue monitoring and covert identification.” Aurora will also show its FaceSentinel Sensor integrated with the Fastlane Glassgate 300 turnstile, operating in both token-free “Identification” Mode (1:n), which allows registered users access simply by looking at the sensor, and in “Verification” Mode (1:1), which adds a biometric layer to the functionality of any access control system. In Verification mode, FaceSentinel confirms the identity of a person holding a card or entering a PIN, before passing the details through to the access control system. Both authentication and verification happen in a second or less. FaceSentinel is the world’s first biometric access control authentication product powered by Deep Learning; the system uses AI and infrared light to achieve unparalleled facial recognition speed, accuracy and reliability. Aurora’s facial recognition technology is – among other places - used throughout Heathrow Airport for boarding pass verification and in British Airways’ domestic self-boarding gates. Deep Learning is a pioneering technique used to create a highly optimised Artificial Intelligence. It works by first creating a blank “brain”: an artificial neural network. This brain is then trained to recognise faces by presenting it with millions of face image examples, enabling it to become more experienced, faster and more accurate at the facial recognition task than any human or existing technology could be. Integrated Design Limited (IDL) is the designer and manufacturer of Fastlane Turnstiles and Door Detective anti-tailgating products, and has over 30 years of experience and a worldwide distribution and installation network. sst

Do you have news for us?

Good! Email us at sst@tradelinkmedia.com.sg 18

Security Solutions Today • September / October 2017


AROUND THE WORLD | IN THE NEWS

Completion of The Sale of Safran’s Identity and Security Activities

P

aris, France - Safran announces the completion of the sale of its identity and security activities to Advent International for Euro 2.4 billion.

As announced on September 29, 2016, the transaction will result in a pre-tax capital gain to be recorded in Safran’s first-half 2017 accounts. The identity and security activities had been classified as “discontinued” in Safran’s 2016 accounts. Safran’s financial outlook, issued upon publication of 2016 annual results on February 24, 2017, refers to “continuing operations” and is unaffected by this change in scope. This transaction follows the sale of the detection activities in April 2017. Safran has therefore completed its strategic refocusing announced at its Capital Markets Day in March 2016. The Group is now entirely focused on aerospace and defense, and concentrated on its own path of strong growth and high profitability. The contemplated acquisition of Zodiac Aerospace by Safran would create the world’s third largest player in aerospace* and the world’s second largest player in aircraft equipment. sst *Excludes airframers

September / October 2017 • Security Solutions Today

19


IN THE NEWS | AROUND THE WORLD

Integrated and Accurate Fire Detection Within Seconds - Bosch Introduces AVIOTEC VideoBased Fire Detection

M

unich, Germany Bosch Security Systems introduces AVIOTEC, a new solution for reliable and early fire detection in challenging environments. Building upon proven Bosch camera technology and Bosch’s Intelligent Video Analysis (IVA), video-based fire detection can supplement state-of-the-art fire detection technologies and enables early detection of smoke and flames in environments where these cannot offer satisfactory reaction times such as buildings with high ceilings or dusty and humid areas. AVIOTEC can also secure environments where no other solutions exist, for example saw mills or paper factories, hangars or extremely large monitoring areas.

Detect Fire at the Source Using intelligent algorithms in surveillance cameras, AVIOTEC can identify smoke and flames as soon as they come into the range of the camera instead of having to wait for smoke to migrate to state-of-the-art smoke detectors. By detecting fires at the source rather than the ceiling, cameras can issue an alarm within seconds while for point detectors it can take minutes to detect an alarm condition. AVIOTEC is based on intelligent algorithms to distinguish between real fires and disturbance values like reflections, movements or backlights. This guarantees a very reliable detection with almost no false alarms. AVIOTEC offers proven detection reliability in all test fires (TF1 through TF8) as specified in EN54. The video-based fire detection system AVIOTEC scales well from a single camera to a networked

20

good understanding of the current situation even before they arrive on the scene.

Combining Safety and Security

system of distributed cameras with a central console and management system. Using Bosch’s Dynamic Transcoding technology it can relay alarms to an existing fire alarm panel or transmit them via Ethernet to a monitoring center or even a mobile device like an iPad. Receiving HD quality video images in real time gives the firefighters a

Security Solutions Today • September / October 2017

Cameras are easy to install and require very little maintenance in contrast to state-of-the-art smoke and flame detectors. The use of PoE cameras (Power over Ethernet) can eliminate the need for individual power supplies and power cables, making AVIOTEC even more cost efficient. AVIOTEC can also be used for very small and distributed facilities such as power stations and signal boxes where the benefit does not justify the installation of fire panels. sst


AROUND THE WORLD | IN THE NEWS

Bosch Launches Free Video Management System Viewer for Small and Medium Businesses

W

ith the Bosch Video Management System (BVMS) 7.5, Bosch has expanded its range of VMS software with the introduction of the BVMS 7.5 Viewer - a new variant aimed at small and medium-sized applications. This entry-level and free of charge version of Bosch’s existing Video Management System enables small business owners to view multiple live video streams of their surveillance cameras in high resolution from their computer screen. It also allows replaying recorded videos, and carrying out forensic searches of video recordings.

once a theft occurs, a store’s security manager can easily define a specific perimeter, meaning the area or even a specific shelf in the store from where the item was stolen. The video database can then be very quickly scanned for any suspicious activity that occurred within that perimeter. The BVMS 7.5 Viewer will deliver the section of the video recording showing that particular event to the user’s desktop or notebook screen within seconds, so there is no need to watch hours of recordings trying to find the exact moment when the object was removed from the shelf.

The BVMS 7.5 Viewer is particularly easy to install and use and can be downloaded free from the Bosch website. To access live and recorded video only two configuration steps are necessary: Firstly, users assign their selected devices to the system, and then simply organize and cluster them as needed.

BVMS 7.5 Viewer is a scalable solution for Windowsbased operating systems. It supports all Bosch video products and grows with the user’s needs.

Thanks to the software’s motion and forensic search function, even a huge recording database can be scanned for a specific event within seconds. The rules for the search are easily definable via a graphical user interface and can be changed even after an event. For example,

The free version it supports up to 16 video cameras and five recording devices, in up to 16 different locations. If more sites or enhanced features are required, it can easily be upgraded to a fee-based solution to include further functions and support up to 10,000 sites, reusing the existing configuration, and with the same look and feel so that no further operator training is required. sst

September / October 2017 • Security Solutions Today

21


IN THE NEWS | AROUND THE WORLD

ComNet Enhances Cybersecurity at the Edge by Introducing Port Guardian Physical Port Lockout

L

eeds, UK - ComNet Europe Ltd of Leeds in the United Kingdom, part of ComNet Communication Networks, a USAbased manufacturer of transmission and communication networking equipment, has introduced a new Cybersecurity feature in its latest generation of self-managed switches. The ComNet Port Guardian feature has the capability to physically disconnect a port if unauthorised access is detected. The value in Port Guardian comes in situations where network access is attempted by disconnecting an IP addressable device on the edge to connect to the network. When Port Guardian senses the disconnect, an SNMP notification is sent to the head end and the effected port is physically locked out, preventing access. The network administrator can reopen the port when the threat is eliminated. This feature also thwarts access through “Spoofing” by disconnecting the port as soon as an interruption is sensed. This new feature is being added to the newest generation of ComNet SMS products including the CNGE2+2SMS and CNGE4+2SMS. The feature will also be available on the new ComNet USAmade Managed Switch line.

According to Steve Clarke, ComNet Europe Managing Director, “Unauthorised access issues or Cybersecurity is a critical challenge facing every network manager today. Your security network with its accessible outside connection, is an easy way to bring down your network. Cybersecurity is not something confined to just a security IP network. Any network can be infiltrated. By introducing this valuable feature on these cutting-edge products, we can provide another unmatched advantage to our partners.” “ComNet’s goal from day one has been to be a smart and secure choice for transmission products. Our position is that if you are concerned about the long-term success of your application, choosing ComNet ensures it will be,” said Skip Haight, ComNet VP of Marketing. “Port Guardian is another reason ComNet continues to move ahead of our competitors,” Haight continued. ComNet offers an extensive line of fiber optic, copper and wireless video and data transmission equipment that is uniquely designed to meet the needs of the Security, Intelligent Transportation System, Utility and Industrial markets. sst

Mocana Raises $11 Million in New Funding to Revolutionise IoT Security and Enable IoT Devices to Defend Themselves Against Cyber Attacks Investors Deepen Commitment to Technology Used to Protect Millions of IoT Devices and Industrial Control Systems

S

an Francisco, California, USA - Mocana Corporation, a leading provider of missioncritical IoT security solutions for industrial control systems

and the Internet of Things, today announced that the company has received $11 million in additional investment from Sway Ventures, Shasta Ventures, Trident Capital

Fund and GE Ventures. With the added capital, which brings the total amount raised to $93.6 million, the company will continue to advance its IoT Security continue on page 23

22

Security Solutions Today • September / October 2017


AROUND THE WORLD | IN THE NEWS

Platform to protect the billions of connected devices that comprise the industrial IoT market, which Grand View Research predicts will be valued at $933.62 billion by 2025. The funds will be used to accelerate innovation and drive growth. The company serves hundreds of industrial manufacturing and IoT companies and its software protects more than 100 million IoT and industrial control devices.

into industrial cloud systems to provide security, reliability and defense against sophisticated cyber attacks.

“Mocana has a mission and responsibility to protect the billions of devices that make up the Internet of Things,” said William Diotte, CEO, Mocana. “Hackers are taking advantage of weak security in IoT devices and industrial control systems, and the pace and impact of cyber attacks is only increasing. Mocana’s IoT Security Platform allows IoT devices of every size to defend themselves from cyber attacks by using military-grade cryptographic software installed on a chip, or flash memory embedded within a device. We couldn’t be more excited about the support we’ve received from investors and the dedication from our team to bring the next generation of security technology to market, at scale.”

General availability of the Mocana IoT Security Platform, a comprehensive full-stack security solution to protect industrial IoT devices, industrial clouds and device-to-cloud communications. Availability of the Mocana IoT Security DevKit that gives developers, without deep cybersecurity or cryptography expertise, a way to simplify the notoriously difficult integration of hardware-based security features into IoT devices.

The Mocana platform provides a full-stack solution for securing IoT systems from the endpoint, to the gateway, to the cloud and back again. Mocana is solving one of the biggest challenges of defending against cyber attacks: enabling devices to defend themselves once a hacker gets behind a firewall or gains access to a computer on the inside of a private network. The platform ensures that both the device and its data can be trusted, by securing the boot process and firmware, and securing the transmission of data between the device, gateway and cloud. Hundreds of companies, including GE, General Dynamics, Panasonic, Schneider Electric, Siemens and Yokogawa have integrated Mocana

The new funding round marks an additional milestone for the company as it continues to gain an advantage in the market. Over the last several months, Mocana has demonstrated strong momentum with significant company and product milestones, including:

Participation in the EdgeX Foundry as a founding member, alongside Dell, AMD, Canonical and 40 other companies that are committed to building an open framework for IoT edge computing and an ecosystem of interoperable components. Partnership with Dell to integrate the Mocana IoT Security Platform with the Dell Edge Gateway 5000 for industrial IoT. Partnership with DDC-I to deliver an integrated platform that enables avionics developers to equip their safety critical systems with advanced security capabilities.

Investor Support of Mocana: “Mocana’s approach to protecting IoT devices by enabling them to defend themselves is a meaningful paradigm shift for the security industry, that has, until now, relied heavily on perimeter-based security,” said Brian Nugent,

founding general partner, Sway Ventures. “We love the company’s strategy, and the Mocana team is already delivering on that strategy.” “Mocana is leading the industry by managing security at the chip level,” said Rob Coneybeer, managing director, Shasta Ventures. “With today’s multivendor, multi-platform enterprise environments, there’s no other way to shrink the number of security vulnerabilities. Mocana’s industrial-strength security software stack continues to deliver peace of mind to its customers and we are thrilled to be partnering with the team.” “Mocana is on a mission to fundamentally change how the industry thinks about security by shifting focus from perimeterbased approaches to actually embedding trust inside devices to ensure secure device-to-cloud communications,” Alberto Yépez, chairman of the board, Mocana and managing director, Trident Capital Fund. “To achieve this, Mocana has been building out its executive team to steer the company into a stage of high-growth to support its strong customer base that includes the world’s most sophisticated device manufacturers and service providers.” “Mocana has been helping industrial manufacturing and automation companies to secure industrial control systems, SCADA networks, avionics subsystems and IoT devices since 2002,” said Michael Dolbec, managing director, GE Ventures. “Mocana’s new IoT Security Platform is solving operational technology and IoT security challenges by tackling one of the toughest industry problems making industrial controllers and IoT endpoints more secure and trustworthy.” sst

September / October 2017 • Security Solutions Today

23


IN THE NEWS | AROUND THE WORLD

EDESIX Launch New Videotag at IFSEC 2017 The body worn camera specialist will also be showcasing its new X Series and ONStream products

L

ondon, UK - Edesix, a market leader in the provision of body worn camera solutions, will be launching a range of new products at IFSEC 2017, all designed to enhance security and the protection of staff.

VideoTag Series Edesix’s VideoTag Series, the VT-100 and VT-50, are its smallest, lightest and most discreet incident recorders to date and are proven to deter aggression, protect staff and provide secure evidential-quality footage on demand. Designed for less frequent use than Edesix’s VideoBadge body worn cameras, both the VideoTag VT-100 and VT-50 are lightweight, unobtrusive, costeffective and easy to use. Both require no extra training, stream live footage, and have a standby battery-life of up to three months meaning users don’t need to worry about charging the device frequently. The VT Series also provides complementary audio and video capture

of incidents when utilised as part of a larger body worn camera and CCTV security function. The VT-50 has been designed mainly for indoor use, and is aimed at sectors such as airlines, indoor retail or education. The VT-100 is a more robust, weatherproof camera and has room for an ID badge. It is ideal for lone workers, debt collectors, supermarket workers and areas of the police. The VT-50 can record up to one hour of footage, while the VT-100 records up to 2 hours. “The VideoTag Series provides another option in our armoury of body worn cameras, they are light-weight and completely unobtrusive, making them perfect for any uniform, and ideal for those looking to record on a less regular basis or to equip all staff with recording devices,” comments Richie McBride, managing director of Edesix. “The VideoTag will complement your current security function, providing additional body-worn protection to staff throughout any organisation. The VideoTag Series allows staff in public-facing roles, who are not part of the security team, to create a safer working environment for themselves and their colleagues. He adds: “Body worn cameras are now making a real difference to the protection of staff, and the general public, across an ever-growing list of sectors, including security, retail, local authorities, and emergency services to name but a few.”

X Series The X series; the X-100 head mounted camera and the X-200 torso mounted camera, are external camera accessories for the VB-300 VideoBadge. Both continue on page 25

24

Security Solutions Today • September / October 2017


AROUND THE WORLD | IN THE NEWS

cameras allow for 1080p recording and are designed for tactical use. The X-100 is a side-mountable tactical head camera, ideal for use on headwear as currently utilised by police firearms divisions. The X-100 offers automatic rotation of footage, meaning it can be worn on either side of the head without requiring user configuration to rotate footage. The X-200 is a torso-mountable camera for use on uniform vests, tactical body armor or all-weather clothing. Both accessories are easy to operate and integrate into an existing evidence capture procedure. Recording is triggered by a toggle push-button and

haptic, audible and visual alerts will leave the operator and the public aware of recording beginning and ending. ONStream ONStream, Edesix’s new camera streaming gateway software, enables ONVIF compliant Video Management systems to be compatible with Edesix body cameras, streamlining the management of footage for users. Cameras integrate seamlessly with VideoManager and leading CCTV Video Management Systems via ONStream, meaning captured footage can be instantly shared and viewed by security staff. sst

Essence Voice Panic Detector Wins Iot Breakthrough Award

T

el Aviv, Israel - Essence’s ground-breaking Voice Panic Detector (VPD) has continued to win awards for its voice-enabled emergency alerting technology for seniors. Having been recognised within the industry several times since its release in 2016, the VPD has now won the IoT Breakthrough Award for Health and Wellness. The prestigious award was presented in recognition of Essence’s Intelligent Voice Activation (IVA™) technology. The IoT Breakthrough awards honor excellence and recognise the creativity, hard work and success of IoT companies, technologies and products. The technology behind the VPD, IVA™, is an always-active technology that recognizes preset vocal commands and triggers specified actions, enabling senior residents to receive emergency attention in situations where they are unable to activate a panic button. This technology gives a major boost to a senior care market that has remained largely stagnant in its ability to move past the basic panic button technology as a way for seniors to call for help. Winning this award recognises Essence’s innovation as part of its Smart Alerting device portfolio. This complements the Care@Home senior monitoring service platform that allows seniors to age independently by seamlessly tracking daily activities and alerting professionals and family in emergency situations. Essence’s Connected Living platforms are designed to enable service providers from different verticals the ability to provide connected home solutions to their customers with long-term revenue opportunities for Security, Health, Telecom, Energy and Insurance companies. sst

September / October 2017 • Security Solutions Today

25


IN THE NEWS | AROUND THE WORLD

Toshiba Launches ExacqVision Trade-in Program Customers receive twenty percent discount on Toshiba Percept NVRs

I

rvine, California, USA - Toshiba Surveillance & IP Video Products Group, a business unit of Toshiba America Information Systems, Inc., has launched its first-ever ExacqVision® Trade-in Program, incentivizing ExacqVision users in the Americas to experience Toshiba’s Percept NVR and Surveillix Web Services cloudempowered recording platform to unlock breakthrough performance for their video surveillance management system. For a limited time starting today, existing ExacqVision customers will receive a 20 percent discount on a Toshiba Percept network video recorder equipped with Surveillix Web Services when they trade-in an ExacqVision appliance or server, regardless of age. To participate in Toshiba’s ExacqVision Trade-in Program, customers should visit www.toshibasecurity.com/tradein for additional details. ExacqVision hardware will be recycled responsibly via zero landfill and recycling methods appropriate to material type.

26

“Our Percept cloud-empowered NVRs really provide our reseller partners with a way to bolster their recurring revenue around surveillance and differentiate themselves in the market. Leveraging our Surveillix Web Services, they unlock the simplest, most powerful IP video surveillance management solution available today,” said Greg Hartzell, Director of Toshiba Surveillance & IP Video Products Group. “Our new trade-in program allows us to introduce ExacqVision customers to the Percept experience and help them streamline their operations, improve their network security, and reduce their software licensing costs, among other benefits.”

Trade-Up to a Better VMS Experience Hartzell notes that while ExacqVision has historically been a leading video management system, it requires significant configuration and maintenance when deployed across a large number of locations. Surveillix Web Services simplifies

Security Solutions Today • September / October 2017

the experience by migrating management of user permissions and recorder access to the cloud, enabling the managing of hundreds or thousands of users and sites from one secure, central location. Also, the Surveillix Web Services infrastructure eliminates the need for port forwarding and enables remote access without opening inbound ports on a firewall to maintain a hardened network and save configuration time. Finally, while ExacqVision Start is a cost effective offering, users must pay for Professional or Enterprise licensing to access the features required to manage video across a multi-site enterprise. Users must have an Enterprise license and a current SMA for access to the Exacq health monitoring service. Surveillix Web Services save users money by delivering three cost effective versions priced per channel. All software versions are compatible with the full suite of innovative Surveillix Web Service solutions including health monitoring. sst


AROUND THE WORLD | IN THE NEWS

Gemalto and Dessmann Enhance Smart Lock Security with Mobile Convenience

A

msterdam, Netherlands - Gemalto, the world leader in digital security, is enabling security and reliable connectivity for Dessmann’s new smart lock platform. The new solution from the global manufacturer of smart locks and safe boxes incorporates Gemalto’s Machine Identification Modules (MIM) and Secure Elements (SE), empowering users to lock and unlock doors with their smartphones or create digital key chains for multiple locks. The solution provides increased security compared to traditional locks.The mobile app can be used to create spare or temporary virtual keys remotely and can simplify shared accommodation services. For instance, it is able to track and monitor who unlocked a door recently. The application also sends instant notifications if a door is forced and can automatically trigger the lock’s built-in alarm. The smart lock market is likely to expand rapidly over the next few years. According to Transparency Market Research, its compound annual growth rate is estimated to reach up to 18.3%, leading to a substantial increase in market value, from US$226.7 million in 2016 to US$1.01 billion by 2024. Fuelled by rising standards of living and increased awareness regarding physical security and safety, the Asia Pacific region is fast becoming an important market for the smart lock industry. “Security is at the heart of any innovative smart lock technology and remains important for us. We are constantly on the lookout for complementary technology that enhances the security of our products and services.” said ZHU Zhiling, CEO of Dessmann.

“Gemalto has a catalogue of solutions and expertise we need for our new smart lock. Its ability to deliver end-to-end security solutions as well as a roadmap to future IoT-optimized connectivity like LTE Cat NB-IoT instantly won us over.” “The world is turning digital at an unprecedented pace, with smart homes quickly emerging as the new cornerstone of connected living. We are expecting connected smart locks to become a natural part of people’s everyday life in the near future,” said Suzanne Tong-Li, Senior Vice President of Greater China and Korea for Mobiles Services and IoT, Gemalto. “Our complete suite of secure IoT solutions and services help manufacturers achieve the highest level of trust for consumers, which is essential for services like virtual keys.” sst

Highways England to Deploy Standards-based CCTV System Based on ONVIF Open Standards

S

an Ramon, California, USA – ONVIF®, the leading global standardisation initiative for IP-based physical security products, announced today that  Highways England  has adopted an ONVIF – centric open standards approach to video technology for the continued expansion and management of its national highway CCTV and traffic system. The use of an open, standards-based CCTV system allows the national transport organisation to support existing CCTV cameras while providing a pathway for adding new, ONVIF Profile S conformant cameras from a variety of different vendors to the system.    continue on page 28

September / October 2017 • Security Solutions Today

27


IN THE NEWS | AROUND THE WORLD

Highways England sought a standards-based approach for its CCTV and traffic system, which oversees motorways and major roads in England, in order to maximise the value of its bespoke CCTV cameras and to help keep tax payer-funded expenditures as low as possible. In addition to enabling continued control of existing CCTV assets and an incremental migration from legacy analog to IP, a standards-based approach offers Highways England the ability to use new innovative CCTV technology as it appears in the general market. As part of the ONVIF-centric, open standards approach, Highways England will specify that any new cameras added to the CCTV system must be conformant to ONVIF Profile S, whilst recording shall conform to ONVIF Profile G. “Government entities and municipal councils are increasingly choosing to base their physical security infrastructure on open standards, like those established by ONVIF, in order to maintain a CCTV system that is vendor-neutral, flexible and future-proof,” said Jason Moss, Technical Director of Intelligent Transport for Mouchel, the consulting group assisting Highways England with its CCTV system. “This approach allows Highways England with help from its system integrator Costain to migrate to an open standards-based system incrementally as bespoke cameras reach their end of life and are replaced with ONVIF Profile S-conformant models from different vendors with use-appropriate feature sets.” Highways England and two other major stakeholders

are also joining forces with ONVIF to establish standard interfaces that can be used to allow users of their legacy and future CCTV systems to safely and securely access each other’s images. This will provide a truly open standards-based approach and provide flexibility in vendor selection to Highways England operations for the future. “This collaboration with Highways England is a valuable one because we are given the opportunity to work closely with an end user who is solving a very real problem shared by many organisations – the need to modernise their CCTV infrastructure without replacing their entire system,” said Per Björkdahl, Chair of the ONVIF Steering Committee. “An added benefit of the collaboration is that Costain has become an ONVIF member and will bring a valuable perspective to the work of ONVIF in the future.” Founded in 2008, ONVIF is a leading and well-recognised industry forum driving interoperability for IP-based physical security products. The organisation has a global member base of established camera, video management system and access control companies and more than 7,000 Profile conformant products. With Profile S for streaming video; Profile G for recording and storage; Profile C for physical access control; Profile Q for improved out-of-the-box functionality and the Release Candidate Profile A for access control configuration, ONVIF continues to work with its members to expand the number of IP interoperability solutions ONVIF conformant products can provide. sst

Koorsen Chooses Hikvision for Circle of Excellence Award Excellent support and product quality led to Hikvision’s selection as a top manufacturer partner by Koorsen Fire and Security

C

ity of Industry, California, USA - Hikvision USA Inc., the North American leader in award-winning video surveillance products and solutions, is pleased to announce it received the Koorsen Fire and Security Circle of Excellence Award. Koorsen Fire & Security, an Indianapolis-based integrator established in 1946, annually grants this award to a partner that exhibits exemplary performance in supporting its business. “Koorsen evaluates partners on sales and product support, product quality and/or a notable event where the recipient helped Koorsen better serve its customers. In the 2016 calendar year, Hikvision was no less than extraordinary in their commitment to Koorsen Fire and Security and its customers,” said Bryan Smith, director of the security business at Koorsen. “This is evident in continued sales support through touring our branches, making last-minute sales calls with customers, and assisting with engineering of systems.”

continue on page 29

28

Security Solutions Today • September / October 2017


AROUND THE WORLD | IN THE NEWS

Smith said Hikvision has always approached technical and product support with the utmost urgency and dedication to service and Koorsen customers have commended the performance of Hikvision security systems. “The Koorsen Circle of Excellence Award is an honor for our company and speaks to the solid effort on the part of our regional sales team,” said Jeffrey He, president of Hikvision USA Inc. and Hikvision Canada Inc. “As the leading manufacturer in our industry, we always strive to deliver excellence in customer service and support.” sst

Johnson Controls Security Products Signs on With New Distributor Partner ISCS New distribution partner in Australia highlights continued growth for video brands in the Pacific region

S

ydney, Australia– Tyco Security Products, now known as Johnson Controls Security Products, is pleased to announce the appointment of International Security Control Solutions Pty. Ltd (ISCS) as a new distributor partner for Australia for the company’s line of video surveillance solutions. A leading distributor to the Australasian security market, ISCS has a national presence with branches in Sydney, Melbourne, Brisbane and Adelaide. Under the terms of the agreement, ISCS will expand access to Johnson Controls Security Products’ industry leading video surveillance brands to the ISCS customer base throughout Australia. The brands include Exacq, known for its intuitive video management system software and recording hardware, and the Illustra brand of cameras, Johnson Controls Security Products’ fast growing IP cameras portfolio. Paired together, technology from Exacq and Illustra provide robust solutions for a wide range of surveillance users, from enterprise to small to medium size organisations. Ken May, Vice President, Asia-Pacific Sales said “The agreement with ISCS reflects the growing recognition and market demand in the Australian market for competitive and easy to configure video solutions.

Exacq has been hugely successful in the SME and mid-size enterprise segments, and we look forward to offering the market plug and play integration at the edge with our Illustra camera range through ISCS’ robust national channel.” Darren Banks, Regional Sales Director, Pacific said “With full featured offerings in training and design services and outstanding customer support, we’re pleased to have the full breadth of ISCS to further support our video solutions and our current and future customers in Australia.” Stuart Harmer, Managing Director, ISCS said “As the leading distributor of access control and CCTV products within Australia, ISCS has an extensive network of integrators and we are confident that Johnson Controls Security Products will be received well within the Australasian market.” ISCS will carry Johnson Controls Security Products’ video surveillance solutions from June, with the first major demonstration of solutions from Exacq at stand G10 at the 2017 Security Exhibition and Conference, 26-28 July, International Convention Center Sydney, Darling Harbour. sst

September / October 2017 • Security Solutions Today

29


IN THE NEWS | AROUND THE WORLD

IFSEC 2017: Magos Launches Unique CrossPlatform Perimeter Surveillance Management Software The MASS can be integrated with a variety of Video Management Systems

L

ondon, UK - Magos Systems Ltd., a leading designer and manufacturer of miniature plug & play radars for perimeter security applications - launches its unique cross-platform perimeter surveillance management software at IFSEC. The MASS (Magos Area Surveillance Software) Control Suite software can be quickly, easily, and efficiently integrated with a variety of video management systems. MASS is a fully automated system that handles, controls, monitors, and logs intrusion alerts, based on input from multiple sensors, including ground surveillance radars and PTZ cameras. Easily

30

set up and installed with a setup wizard and installer app, areas of coverage can be precisely defined, thus enabling a significant reduction in false alarms. The software can be integrated with a wide range of VMS, including Milestone, Avigilon, Genetec , FLIR Latitude, EXACQ, Symphony, and others. Features include automatic PTZ Slew-to-Cue plug and play with ONVIF cameras, integrated video analytics target classification for minimal FAR, advanced masking/ GEO fencing capabilities, and mobile device operation and pairing with real-time blue force tracking. MASS supports an

Security Solutions Today • September / October 2017

unlimited number of sensors including ground surveillance radars, PTZ cameras, and smart fence detection sensors. The system provides web, IP, and mapbased radar control interfaces. It enables fully unattended operation with multi-site capabilities. According to Mr. Gadi Bar-Ner, VP Marketing, “The software, developed by the company, represents a new generation of advanced management systems, enabling the highest level of flexibility as well as simple installation and implementation of the system. The software is fully developed and available to our customers.” sst


HomSecure, A Smart WiFi Device Connecting Home Alarms, Continues Raising Funds on Kickstarter Designed to connect existing home alarms using smart WiFi, this device sends alerts to a user’s phone while they’re away

D

ublin, California, USA - Wavepod Technologies has raised over $15K on Kickstarter for their newest product, HomSecure. The device was created as a more affordable solution to using smart technology, and to stay updated on the status of users’ homes. There is no monthly fee, no need to replace or move existing alarms and very little setup is required. “Our home is a safe haven where we create and keep some of the most cherished moments of our lives. That’s why we try our best to keep it safe and secure,” said Sundeep Chauhan, CEO of HomSecure. “Most homes have multiple alarms, including smoke, Carbon Monoxide and security alarms. So, we thought it would be easy, smart and informative to connect all of the alarms within one, easy-to-use device.” Large companies like ADT Security Services charge consumers hundreds of dollars a year to have the same accessibility to the security of their homes that HomSecure provides. In addition, only one device is needed per home, making this device a fraction of the price. The app is available on both Android and iOS, allowing users seamless integration. Not only is HomSecure cheaper than alternatives, but it also detects more alarms and notifies homeowners when they sound. These alarms include smoke, carbon monoxide, security, and water. By listening to its surroundings, the device acknowledges when an alarm is detected. From there, the device transmits a signal to the application installed on the user’s smartphone. It works with a wide variety of each alarm type, allowing consumers to keep their existing products, and convert them into smart devices by using HomSecure. Most smart home automation systems require installation by the company that consumers choose. However, HomSecure can be installed by the customer by plugging it in and connecting it with their WiFi at the home. In case of a power outage, internet connection problem, or tampering, HomSecure is programmed to notify the user immediately. It is user friendly, and provides the constant smart security that consumers desire. sst

September / October 2017 • Security Solutions Today

31


IN THE NEWS | AROUND THE WORLD

Knightscope Partners with Konica Minolta • • •

Company secures $3 million strategic investment commitment Executes 3-year service contract providing infrastructure to cover all 50 states Commercialising self-driving technology at scale with autonomous security robots

M

ountain View, California, USA- Knightscope, Inc., developer of advanced physical security technologies focused on significantly enhancing US security operations, announced today that it has executed a commitment letter for a $3 million strategic investment from Konica Minolta, Inc. [TYO: 4902]. Konica Minolta has invested $1 million immediately and has committed to invest an additional $2 million upon achievement of certain milestones. This commitment is in addition to the prior investment made in 2014. The capital is to be invested in Knightscope’s current Reg A+ “mini-IPO” offering of Series m Preferred Stock. Further terms were not disclosed. The initial relationship was established between the parties by Konica Minolta’s Business Innovation Center (BIC) which is driven by “Giving Shape to Ideas.” The original proposition of leveraging Konica Minolta’s service technicians in the U.S. to provide the support infrastructure for Knightscope’s growth was envisioned and architected in 2015, piloted in 2016 and successfully operationalized in 2017. “Knightscope has demonstrated tremendous growth on the cutting edge of the security industry. Their autonomous capabilities and crimedeterring technology helps further the robotics and AI

32

Security Solutions Today • September / October 2017

sector, a key focus area for the Konica Minolta Business Innovation Center,” said Ekta Sahasi, vice president of the U.S. Business Innovation Center. Concurrent with the investment, the parties also executed a 3-year service agreement to build on their existing operating relationship. While the majority of all repairs and patches to Knightscope machines may be successfully completed over-the-air 24/7, the agreement enables the Company to call on Konica Minolta at times when a service technician is required to be on premise. Knightscope and Konica Minolta have been operating together using this model throughout California, Texas and Massachusetts. “This is our year to begin scaling operations, and we are in process of adding Florida, New York and Washington D.C. with a sales pipeline that continues to strengthen every week. The team members at Konica Minolta have been true professionals and, in a number of cases, have gone beyond the call of duty to support Knightscope and our clients. We are proud of our partnership as we drive to our ambitious goal of cutting the $1 trillion annual negative economic impact of crime on the U.S. literally in half. That would have a material and positive impact on everything and everyone,” said William Santana Li, chairman and chief executive officer, Knightscope, Inc. sst


AROUND THE WORLD | IN THE NEWS

Deja vu Security Announces Ransomware Readiness Service Seattle based Deja vu Security’s latest service offering, Ransomware Readiness Service, equips companies to understand their exposure to and develop plans to deal with global threat scenarios like ransomware

S

eattle, Washington, USA - Seattle based Deja vu Security’s latest service offering, Ransomware Readiness Service, equips companies to understand their exposure to and develop plans to deal with global threat scenarios like ransomware. Ransomware is one of the leading cyber security threats to business operations, as evidenced by the recent WannaCry outbreak that affected 200,000 or more computers worldwide. According to a 2016 FBI report, more than 4,000 ransomware attacks occur daily, and that 300% increase over 2015 incidents is before WannaCry is taken into account. The Ransomware Readiness Service includes a comprehensive assessment of IT infrastructure, backup policies, and the locations and relative security of critical assets and databases. By analysing these points and assessing them for risk of exposure, Deja vu Security prepares you to combat and recover from the ransomware attacks. This offering is part of Deja vu Security’s StaySecure™ service line, StaySecure addresses the operational security needs of IT organisations for mid to enterprise customers.

Securing Against Ransomware It all starts with identifying the critical assets and current methods of security employed. Once these assets are identified, the prevention and recovery plans are evaluated and improvement solutions are offered in the form of an attack prevention roadmap, as well as a plan for your organisation to rapidly recover in the event of a ransomware attack. Once Deja vu Security determines an organisation is found to be sufficiently prepared to withstand an attack, it coordinates a comprehensive and realistic security exercise with IT personnel to simulate attack and recovery procedures.

Leveraging Cybersecurity Experience Organisations face revenue and productivity losses with every instance of down time, all the more so when a virulent ransomware strain is infecting systems laterally without user input. Facing such losses and loss of consumer trust in the organisation does not have to be the only option. Through a deep understanding of network attack surfaces and policies, Deja vu Security’s Ransomware Readiness Service secures infrastructure and revenue for organisations. sst

September / October 2017 • Security Solutions Today

33


IN THE NEWS | AROUND THE WORLD

LILIN Adds Entry-Level IP Bullet Camera to Video Surveillance Product Mix

A

rcadia, California, USA - LILIN Americas, an entity of Taiwan based IP video manufacturer Merit LILIN, has further strengthened its line of IP cameras with the MR832 outdoor bullet camera, to help security professionals easily deploy a surveillance system. The MR832 features a 4mm fixed lens with an IP66 environment rating, an operating range of -40° to 122°F, along with 30M IR LED illumination and Day/Night imaging. “As IP technology has evolved, so have the expectations of our customers,” said Joe Cook, VP/GM of LILIN Americas. “They want IP outdoor cameras that are easy to install, configure and maintain, that integrate seamlessly, offer high resolution HD images, even in complete darkness, and are competitively priced. The

new MR832 delivers these capabilities, and much more.” LILIN MR832 IP cameras feature 2D wide dynamic range, which provides accurate video capture in high-contrast lighting, and use 3D Noise Reduction for maximum clarity in low light conditions. Energy-efficient IR LEDs automatically illuminate scenes in complete darkness for discovering subjects at a range of up to 30 meters (98 ft.).   To save installation time, the MR832 camera is designed with a multi-angle adjustable wall/ceiling mount bracket for flexibility and ease of use. In addition, the camera supports ONVIF Profile S and is powered by either PoE or DC12V. The MR832 delivers full 1080P HD resolution at 30 FPS while being remarkably compact and lightweight for wall or ceiling mount applications. sst

Kyushu Telecommunication Network (QTNet) Protects its Broadband Network and Enhances Reliability With Nominum DNS Security Industry-leading Vantio CacheServe Preserves Network Integrity through Superior DNS Performance and Blocking of DDoS, PRSD and Other Web-based Attacks

E

dwood City, California, USA - Nominum™, the DNSbased security and services innovation leader, announced today that QTNet, a subsidiary of Kyushu Electric Power Company in Fukuoka, Japan, has selected the company’s DNS solutions to significantly improve the security and performance of its broadband network. QTNet provides broadband connectivity to millions of

households in Kyushu. In particular, the increasing size and number of Distributed Denial of Service (DDoS) and Pseudo Random Subdomain (PRSD) attacks worldwide has prompted the broadband provider to deploy the Nominum DNS solution in order to thwart network attacks, protect its network and prevent latency and service outages caused by malicious activities. QTNet has replaced its previous costly and less effective DNS solution with Nominum

Vantio™ CacheServe to speed DNS query resolution and ensure a reliable internet experience for subscribers throughout the region. “Our brand reputation is closely tied to providing a safe, quality internet experience. Keeping subscribers connected through a secure, fast-performing network is key to maintaining customer loyalty and competing effectively in our market,” said Mr. Kenji Mori, Group Manager, Communication continue on page 35

34

Security Solutions Today • September / October 2017


AROUND THE WORLD | IN THE NEWS

Service Engineering Dept. of QTNet. “Nominum was a logical choice to power and protect our network given that it is the top DNS solution among most major operators around the globe. The security and reliability Nominum delivers are already demonstrating a significant return on investment given the improved network performance and higher levels of customer satisfaction we’re seeing.” “The rise of DDoS attacks, such as the authoritative DNS attack in late 2016 that took many popular websites offline for several hours, poses high risks for broadband operators whose networks aren’t adequately protected,” said Jari Heinonen, Vice President Asia Pacific for Nominum. “When subscribers encounter slow network response times or are unable to access their favorite web sites, they’re likely to blame their service provider and possibly

cancel service. QTNet, like many other providers around the world, is protecting its bottom line and the online experience for subscribers with our industry-leading solution, which also offers cost-efficiency and scalability benefits.”

Vantio CacheServe: The Gold Standard in DNS Resolution For over a decade, Vantio CacheServe has formed the foundation for the world’s safest and most reliable service provider networks, and provides a solid base for securing and enhancing the digital subscriber experience by delivering 100% availability and the industry’s lowest latency metrics. Powerful precision policies accurately manage DNS traffic, ensuring good queries are resolved and those that attempt to connect with harmful websites are blocked. With unmatched cache poisoning defenses, Vantio CacheServe is

able to withstand some of the most harmful threats which compromise other resolvers in minutes, such as Kaminsky’s infamous attack. Through integration of Vantio CacheServe with the extensible Nominum N2™ Platform, deployment of N2 applications is simplified, increasing protection of subscribers and providing deeper engagement through effective, efficient in-browser communications. Vantio CacheServe is backed by responsive 24×7 commercial support staffed with experts steeped in provider requirements. The solution boosts subscriber satisfaction while maximizing the value of network infrastructure investments. More than half a billion internet users in over 45 countries rely on Vantio CacheServe every day for a secure, reliable internet experience. sst

Neurotechnology Releases New MegaMatcher 10 Multi-Biometric Product Line Latest version provides a number of significant updates to fingerprint, face, iris and voice capabilities and a new version of MegaMatcher ABIS.

V

ilnius, Lithuania - Neurotechnology, a provider of high-precision biometric identification technologies, today announced the availability of MegaMatcher 10, the latest update to the MegaMatcher multi-biometric product line. MegaMatcher 10 provides a number of significant updates across the MegaMatcher line, which includes: MegaMatcher SDK, a multibiometric SDK for large scale systems; MegaMatcher Accelerator, the world’s fastest biometric matching engine; and the MegaMatcher Automated Biometric Identification System (ABIS), a turnkey solution. As with previous versions, each biometric modality can be used alone or in any combination to provide increased accuracy and reliability to meet the needs of both small and large-scale biometric identification projects. “This version provides increased accuracy in multiple

biometric modalities, as confirmed by third-party independent tests,” said Dr. Justas Kranauskas, R&D Manager for Neurotechnology. “Together with the fastest biometric engine algorithms and great standards support, these updates enable our clients to create better products in every respect.” The MegaMatcher line covers the following biometric modalities as well as SDKs for them: fingerprint (VeriFinger), face (VeriLook), eye iris (VeriEye) and voice (VeriSpeak) modalities. MegaMatcher SDK includes all these modalities. MegaMatcher Accelerator provides high speed, high volume biometric identification suitable for nationalscale projects. It is available in several editions, including the recently introduced Extreme edition. continue on page 36

September / October 2017 • Security Solutions Today

35


IN THE NEWS | AROUND THE WORLD

that provide support for custom liveness checks.

The Extreme edition is capable of matching 1.2 billion fingerprints per second, 1.2 billion faces per second or 700 million irises per second on a single server with a GPU which make it fastest biometrical matcher in the market. Enhancements to the algorithms and capabilities of the MegaMatcher 10 SDKs and Accelerators include: Fingerprint modality – Continuously tested in both NIST MINEX III and NIST PFTII, this modality includes new extraction and matching algorithms that provide better interoperability with other vendors and improved recognition accuracy on lower quality fingerprint scans. Multiple partial fingerprint scans can be efficiently merged into a single template with the new generalisation algorithm. Face modality – Added capabilities include a new, faster age detection algorithm, improved generalisation, better face image quality determination and ability to process faces up to full profile. Iris modality – Includes new eye segmentation algorithms that can process eyes captured at any orientation, eyes with heavily dilated pupils and even eyes captured not only in nearinfrared, but also in the visible light spectrum range. Compared to the previous version, the Internal

NIST IREX IX report shows a twofold decrease in the recognition error rate on their datasets. Voice modality – An entirely new voice recognition algorithm provides better recognition accuracy in text-independent scenarios. Together with a new, robust voice activity detector it decreases the recognition error rate nearly two times compared with the previous version. MegaMatcher Accelerator fault tolerance – MegaMatcher Accelerator products are faster and more robust with a new failover architecture that utilises a peer-to-peer network structure and requires fewer active nodes to maintain the system. Nodes may also be added dynamically. Updated biometric standards support – includes, among others, ANSI/NIST-ITL 1-2011 support and photo checking according to International Civil Aviation Organisation (ICAO) standards. This includes new checks for face darkness, pixelation, looking away, skin reflections, glasses reflections, skin tone, washed out colors, red eye and ICAO fixes for red-eye correction. Enriched Android support – includes a new multi-modal sample and new liveness check capabilities

While the MegaMatcher SDK is intended for system integrators, MegaMatcher ABIS is Neurotechnology’s turnkey multi-biometric solution for largescale identification projects. It is a modular and customizable solution that provides services for high- performance multibiometric systems with multiple transactions using any combination of fingerprint, face or eye iris biometric modalities. It is available as a complete system and ready for the deployment in national-scale projects. The MegaMatcher 10 line update includes a new version of the MegaMatcher Automated Biometric Identification System (ABIS). “MegaMatcher ABIS provides a standard-based open architecture which ensures easy integration with the existing systems and significantly improves new product development process and delivery time” said Denis Kacan, MegaMatcher ABIS product manager. “This new version of MegaMatcher ABIS brings platform independent web-based applications as well as better performance, smooth integration and deployment.” New MegaMatcher ABIS version includes following enhancements: Biometric technologies - Includes all the biometric technology and algorithm improvements available in the new MegaMatcher 10 line. Integration – Includes webservice based RESTful API for easy integration with other systems such as enrollment and personalisation applications, identity management and fraud prevention systems. Deployment – Significantly improved the system deployment using automatisation processes. continue on page 37

36

Security Solutions Today • September / October 2017


AROUND THE WORLD | IN THE NEWS

Client application – Introduces platform independent webbased applications for key biometric operations – enrollment, identification, verification and adjudication. Performance – Internal

optimisations which improves performance when working with large datasets. MegaMatcher 10 and the entire Neurotechnology biometric product line can be purchased from

Neurotechnology and through distributors worldwide. A free 30day trial is available and, as with all Neurotechnology products, the latest version is a free upgrade for existing customers. sst

Neurotechnology Releases MegaMatcher Accelerator Extreme, the Fastest Biometric Engine in the World Neurotechnology has added a new Extreme edition to its MegaMatcher Accelerator multibiometric solution line for national-scale projects.

V

ilnius, Lithuania - Neurotechnology, a provider of high-precision biometric identification technologies, today added a new Extreme edition to its MegaMatcher Accelerator product line of solutions that provide high-speed, high-volume multi-biometric identification for national-scale projects. MegaMatcher Accelerator Extreme is capable of matching 1.2 billion fingerprints per second, 1.2 billion faces per second or 700 million eye irises per second on a single server with a GPU while maintaining and even improving recognition accuracy. MegaMatcher Accelerator Extreme edition is the result of our many years of research dedicated to biometric technology, said Irmantas Naujikas, Director for Neurotechnology. “

This new product will allow our customers to implement large and complex solutions in a simpler way, utilising considerably fewer servers than before and simplifying system deployment and maintenance.” MegaMatcher Accelerator Extreme edition includes enhanced functionality and reliability compared to the previous MegaMatcher Accelerator version, with more fingerprint, face and eye iris capabilities and significantly faster speeds. It provides bigger capacity, handling up to 160 million fingerprints, up to 40 million faces and up to 200 million eye iris templates on single server. Neurotechnology is offering a simple upgrade path into the Extreme edition from other MegaMatcher Accelerator editions for the existing customers. sst

September / October 2017 • Security Solutions Today

37


IN THE NEWS | EYE ON ASIA

New Secure Biometrics Card V2 Unveiled in the World’s First Open Air Casino

H

ong Kong - Hong Kong’s MeReal Biometrics launched its latest V2 smart card today with a smaller, faster fingerprint sensor, at the opening of the world’s first casino designed solely for open-air gambling, in the South of France. Today, the patented smart card was in the spotlight at the opening of the new Pleinair Casino in the seaside town of La Ciotat in Marseille. It’s one of many exciting cutting edge innovations that this brand new casino boasts to win over a new clientele. The casino, situated on the water’s edge in the town’s marina, is one of 43 casinos and hotels in the Groupe Partouche portfolio. Pleinair Casino is the first of three properties to launch the MeReal Biometrics powered fingerprint and acoustic smart card this year. “This is a momentous day personally. Not only am I proud to be opening France’s and in fact the world’s first casino designed for open-air gambling, but it’s rewarding that my initial idea of a smart card that can identify all our players entering our casinos, hotels, and online games has finally come to fruition,” said Mr. Patrick Partouche, Chairman of the Supervisory Board of Groupe Partouche, also the Chairman of MeReal Biometrics. The MeReal Biometrics smart card will initially be used by employees to grant them access to private back-ofhouse and privileged areas, as well as provide recordkeeping for time and attendance. The group hopes to add more applications - both access and payments - for employees and for its 1 million VIP players who currently carry a “Fairplayer” loyalty card.  “We are excited to launch our V2 card at the opening of the Pleinair Casino. The hotel and hospitality industry is a world in which our card can add unlimited values. Employees, guests, and even suppliers can move around properties and within the brand’s footprint to gain access, make or receive payments, and redeem loyalty rewards without the hassle of typing logins, passwords,

or showing identification documents but never compromising on security,” said Kate Davies, Head of Marketing for MeReal Biometrics. The new V2 card’s improved features include: • smaller sensor • enrolment takes less than 10 seconds on the card • in everyday use the identity is matched via the sensor within one second • multi-finger enrolment • NFC compatibility The MeReal Biometrics card, manufactured in France, also features the standard technology that everyday access and payment cards carry such as RFID (radio frequency identification), NFC (near field communication), and EMV (the EuroPay, MasterCard, Visa standard) chip technology. Combined with the MeReal Biometrics fingerprint sensor, acoustic one-time password and battery power, these cards have unlimited applications 24 hours a day. Use it in all contact modes, all contactless modes or on any device with a microphone, that includes the world’s 9 billion telephone lines (from smartphones to a fixed lines). Plus the cardholder’s fingerprint is stored only in the card, not in a database. sst

Do you have news for us?

Good! Email us at sst@tradelinkmedia.com.sg 38

Security Solutions Today • September / October 2017


EYE ON ASIA | IN THE NEWS

Dahua Technology Selects Synopsys Software Integrity Platform to Secure Its Internet of Things (IoT) Devices

W

orld Leading Solution Provider of Video Surveillance Deploys Synopsys Solutions to Build Security and Quality into Its Software Development Lifecycle and Supply Chain Hangzhou, China – Dahua Technology Co., Ltd, a world leading solution provider in the global video surveillance industry, today announced its selection of Synopsys, to enhance the security of its Internet of Things (IoT) devices and solutions. By implementing Synopsys’ comprehensive portfolio of solutions and services, Dahua strengthens its offerings, building security and quality into their software development lifecycle (SDLC) and supply chain. “We are committed to delivering to our global customer base – from residential to enterprise – the highest quality and most secure Internet-connected devices,” said Fu Liquan, chairman of Dahua Technology. “Synopsys’ comprehensive solutions and services allow us to minimize software-related business risks by building security into the development process, which reduces the vulnerabilities that can jeopardize our products.” Dahua Technology has implemented Synopsys tools to address software security and quality issues throughout

the SDLC using multiple technologies, including static analysis, fuzz testing and software composition analysis. Dahua Technology has also joined the Building Security in Maturity Model (BSIMM) community and will undergo a BSIMM assessment, a comprehensive benchmarking process that provides an objective, datadriven view into its current software security initiative. Using the BSIMM results, Dahua will establish a baseline measurement of its software security program, which will be used to guide its efforts to continuously improve the security and quality of its products over time. “As organisations introduce IoT devices into the market, it is essential to ensure their security and protect customers’ data and privacy,” said Andreas Kuehlmann, senior vice president and general manager for the Synopsys Software Integrity Group. “Dahua’s decision to engage with Synopsys highlights their commitment to provide their customers with IoT devices that incorporate the highest level of security.” sst

Forcepoint Achieves Highest Overall Security Effectiveness Out of 10 Vendors in NSS Labs’ NGFW Test NSS Labs tests prove that Forcepoint NGFW offers the leading combination of enterprise security and low cost, making it particularly effective for SD-WAN and other modern networking initiatives

S

ingapore – Global cybersecurity leader Forcepoint™ announced that its Next Generation Firewall (NGFW) blocked 99.95 percent of exploits in NSS Labs’ 2017 NGFW Test. Forcepoint is the only vendor to block 100 percent of tested exploits run from the NSS Labs static exploit library, and over a continuous live testing period of 31 days, blocked 99.89 percent of “drive-by” exploits that target client

applications. NSS Labs is the leading independent, third-party assessment that tests network security products under real-world conditions. “The security effectiveness of the Forcepoint NGFW 3301 was unsurpassed in the NSS Labs 2017 NGFW test,” said Thomas Skybakmoen, Distinguished Research Director at NSS Labs. “The Forcepoint NGFW should continue on page 40

September / October 2017 • Security Solutions Today

39


IN THE NEWS | EYE ON ASIA

be on every company’s short list.” Forcepoint’s firewall also blocked all evasions while properly identifying malicious content without any false positives, all at a low total cost of ownership. As a result of these high enterprise security ratings and demonstrated operational efficiency, Forcepoint NGFW received its fifth consecutive “Recommended” rating since NSS Labs began testing next-generation firewalls. “With Forcepoint NGFW, we are able to get best-inclass firewall protection and expert management with low upfront investments. The results our users have seen with Forcepoint NGFW have been extraordinary. I’m not surprised to see the Forcepoint NGFW receive the NSS Labs Recommended Rating,” said Hendrik Walter, IT director for Avency in Germany. “Enterprises and government agencies are looking for more efficient ways to connect their people and data without exposing them to increasingly malicious attacks on their internal or wide area networks,” said Rob Ayoub, research director of Security Products at IDC. “Many organisations use NSS Labs test results as independent validation of security effectiveness and performance when selecting a next generation firewall.” The Forcepoint NGFW integrates enterprise-class

security with scalable, centralised management. It offers interactive visualisations for 360° visibility and rapid incident response throughout distributed networks – from data centers and headquarters to software-defined wide area networking (SD-WAN)– enabled remote branches and the cloud. Organisations are recognising that a human-centric approach to network security better protects their employees, critical business data and intellectual property. This entails tighter integration of network management and security, which is particularly important for branches and remote offices where SD-WAN technologies provide greater access but require additional levels of cybersecurity. Forcepoint’s groundbreaking NGFW ratings validate that enterprises and global governments can have strong security and outstanding manageability in a single system. “Forcepoint delivers the best combination of price and security among next-generation firewalls,” said Antti Reijonen, vice president and general manager of the Network Security business at Forcepoint. “Our breakthrough architecture uniquely combines centralised management with software-based security that has now been proven to surpass hardwarecentric designs in both efficacy and efficiency. These innovations are a key part of Forcepoint’s strategy to protect the human point, where people and data come together.” sst

Gartner Says Four Vectors Are Transforming the Security Software Market Analysts to Discuss latest Security Market Trends at Gartner’s 2017 Security and Risk Management Summits

S

ingapore — The security software market is undergoing a dramatic transformation due to four key developments, according to Gartner, Inc. The use of advanced analytics, expanded ecosystems, adoption of software as a service (SaaS) and managed services, and the prospect of punitive regulations are causing enterprises to rethink their security and risk management software requirements and investments.

“The overall security market is undergoing a period of disruption due to the rapid transition to cloud-based digital business and technology models that are changing how risk and security functions deliver value in an organisation,” said Deborah Kish, principal research analyst at Gartner. “At the same time, the threat landscape and rise in the number of high-impact security incidents are also creating demand for security technologies and

innovations that deliver greater effectiveness.”

Four vectors are transforming the security software market: By 2020, Advanced Security Analytics Will Be Embedded in at Least 75 Percent of Security Products continue on page 41

40

Security Solutions Today • September / October 2017


EYE ON ASIA | IN THE NEWS

Enterprises are increasingly seeking products that incorporate “smarter” predictive and prescriptive analytic technologies, which help warn users of potential security incidents and provide guidance on optimal responses. These more-advanced analytical capabilities are driven by a variety of underlying technologies, such as heuristics, artificial intelligence/ machine learning and other techniques. Successful vendors will work with customers and prospects to understand use cases where analytics will deliver significant value and augment limited security staff and resources.

Acquiring and Integrating Products and Technologies Will Be a Critical Strategy to Increase Market Share and Enter New Markets Given the preponderance of startups and smaller vendors pursuing innovative approaches to security problems, acquisition, integration and consolidation are highly effective strategies to

increase market share and enter completely new markets. In many cases, mature vendors in search of continued growth are acquiring faster-growing companies from emerging adjacent markets. In other cases, vendors are optimising profits by consolidating similar products under a single brand, therefore leveraging economies of scale by combining core functions, such as development, support, sales and marketing.

End Users’ Quest for Flexibility Will Increase Adoption of SaaS

Security buyers are making security product investment decisions that support digital business, fit their current challenges and deliver performance value. Gartner’s recent end-user security spending survey indicates that, in order to do this, they have a preference for products in an as-a-service format. SaaS for security and risk management is becoming critical as customers transition to digital business practices. However, providers must

consider the financial implications of maintaining support for legacy security products while investing in an as-a-service product or managed service.

The Regulatory Environment Will Create Opportunities for Security Software Providers

The EU General Data Protection Regulation (GDPR) will come into effect on May 25, 2018 and could see organisations facing heavy fines should they receive a single complaint for mishandling private data. Punitive regulations will create board-level fears, driving security software budget decisions based on the potential financial impact of fines and noncompliance. Consequently, enterprises will look to providers with products that provide the needed visibility and control of their data. Providers should identify the key regulatory requirements and constraints in target geographies by working with legal counsel to deliver product and service choices that will alleviate board-level fears. sst

Komamura to Unveil Falcon Eye Adding Color Night Vision with Infrared Technology The new KC-2000MKII captures subjects under extreme dim-lit conditions

T

okyo, Japan - Komamura Corporation is happy to announce that it launches the new KC-2000MKII as the upgraded model of the current KC-2000 ultra-high sensitivity color night vision camera, featuring a switchable capability to infrared with a touch of lever at any time to capture subject under extreme dim-lit conditions in video or still image. The new KC-2000MKII works as a “two-in-one” night vision camera with hand held convenience either in color or infrared modes whenever you need to switch either way. “The KC2000 color night vision camera is very popular among police and secret forces around the world as a unique handheld tool to see and record in colors during night continue on page 42

September / October 2017 • Security Solutions Today

41


IN THE NEWS | EYE ON ASIA

and day,” said Allan Valentin Hansen, Sales Director at Komamura Corporation. “With the new IR feature of the MK2 version, which allows the camera to also see and record in total darkness, this Falcon Eye camera will become an even more indispensable surveillance tool.” The KC-2000MKII is a lightweight, compact, handy and epoch-making night vision camera that overcomes total darkness as a true “Night Resolver”.

Outstanding Features of the KC-2000MKII

• • • • •

It captures High Definition images in color in extremely dim-lit conditions, down to 0.005 lx during day-andnight, with auto gain control system. It allows IR (infrared) image capturing in total darkness with using IR illuminator. One unit covers all conditions (night and day, in all lighting conditions, in color or IR (infrared), in video and still images. It uses a world-standard battery (7.4V, allowing continuous shooting for about 4.5h). Lightweight (about 1.1kg), compact and handy (measuring 108 x 100.1 x 210.5mm,, excluding the lens). sst

Surveon Ensures Smooth Operation for Crucial Infrastructure with Comprehensive Surveillance Systems

N

ew Taipei City, Taiwan - The critical infrastructure of a nation provides the essential services that support the functioning of the society and serve as the backbone for the economy and security, such as the power we use at home, the water we drink, and the communication systems we rely on to stay in touch with people. To prevent damage to the critical infrastructure by physical means or minimise the effects of natural disasters or sabotage, governments need to rely on intelligent surveillance systems which can provide active alarm to ensure proper actions can be taken when an incident or emergency occurs. To help integrators implement an integrated system, Surveon provides comprehensive surveillance systems for critical infrastructure to improve national economic security, public health and safety. Harsh weather and different light conditions can be challenging for outdoor cameras to be able to function properly with clear images whether during the day or night time. Surveon cameras with true WDR and low lux performance ensure images of incidents including everything from vandalism to natural disaster are clearly captured under any lighting conditions. In addition, it can handle harsh outdoor environments and ensure video footage can still be available in an operating temperature range from −40°C (−40°F) to 50°C (122°F) and 90%+ humidity. Among Surveon’s camera selections, 2MP bullet camera CAM3371EM  with WDR and SONY Exmor Sensor, 2MP outdoor dome camera CAM4361LV with IP67 and IK10 are ideal for such applications. Critical infrastructure solutions often operate in open environments and the number of security guards is usually limited so they require active alarms to ensure smooth operation. Surveon video analytics such as Forbidden Area Detection can be employed for places where access is restricted to staff members. Moreover, with high I/O speed, Surveon Control Center (CMS) can collect data to receive reports of events such as fire alarms, providing seamless communication across different units, such as the police and the operations control center so that proper actions can be taken in a very short time to protect people from accidents such as fire. Surveon is dedicated to offering a variety of end-to-end video surveillance solutions catering to different vertical applications, giving partners reliable options for their projects. sst

42

Security Solutions Today • September / October 2017


EYE ON ASIA | IN THE NEWS

Panasonic Launches New i-PRO Extreme Surveillance Platform H265 Cameras, Recorders and Software that deliver Extreme Performance Under Extreme Conditions

K

uala Lumpur, Malaysia - Panasonic, a leading provider of integrated security and video surveillance solutions, introduced its next generation i-PRO® Extreme technology platform today at Panasonic’s HOME·2·COM Solutions Centre, Bangsar South. The i-PRO Extreme platform is available in Panasonic’s new lineup of cameras, recorders and video management software (VMS) – providing a native end-to-end H.265 system while delivering demonstrable enhancements in image quality, system reliability, IP security and embedded intelligence. With this Launch, Panasonic continues to raise the bar on image quality while simultaneously lowering bandwidth requirements in order to exceed customer expectations. Providing these solutions with robust IP security and an improved ease of use helps users capture, record and manage their video surveillance in even the most demanding surveillance scenarios. The Managing Director of Panasonic Malaysia, Mr. Cheng Chee Chung, said “The introduction of i-PRO Extreme Solutions further reinstates Panasonic’s commitment to providing efficient Surveillance Solutions by maximising customer return on Security Investment.” “Maintaining security is top priority in any business. We at Panasonic are determined to provide businesses with ease of mind through a wide range of security solutions,” added Cheng.

Underlying technology that defines the uniqueness of i-PRO Extreme include: Extreme Visibility: Captures the highest quality images automatically even in very dynamic and challenging lighting environments:

Intelligent Auto Mode: Continuously monitors scene dynamics and motion to automatically adjust key camera settings in real-time. 144dB Enhanced Super Dynamic Range: Industryleading dynamic range performance delivers balanced scene exposure in highly dynamic and extreme-backlit lighting environments. Colour Night Vision: Delivers outstanding lowlight performance (0.0008 to 0.015 lux) with accurate colour rendition and saturation.

Extreme Compression: Industry standard H.265 coupled with

Panasonic’s Smart Coding technology delivers the highest quality images at the lowest bitrates.

H.265 compression delivers high quality images while reducing streaming and storage requirements by approximately 50 percent over H.264. Smart Coding: Working on top of H.265, Smart Coding with GOP Control reduces bandwidth even further for a combined efficiency of up to 75 percent over H.264.  Smart Facial Coding: High performance face detection technology in the camera automatically detects faces in a scene and encodes those regions at the highest quality, ensuring clear identification.

Extreme Data Security: i-PRO’s Secure Communication Suite ensures robust end-to-end IP security of the i-PRO Extremebased surveillance network.

continue on page 44

September / October 2017 • Security Solutions Today

43


IN THE NEWS | EYE ON ASIA

Secure Communication: Because every device with an IP address is potentially vulnerable, i-PRO Extreme with Secure Communication now offers an additional layer of network-based protection including a PC-level security suite, embedded in all new i-PRO Extreme Cameras, Recorders and Management Software for robust data and communications encryption. FIPS Certified: i-PRO Extreme products meet the Federal Information Processing Standard (FIPS) 140-2 Level 1, as required for FBI and Public Safety use. 

Extreme Reliability: Delivers low failure rates and redundancy with HDD Dynamic Power Control, Auto Failover along with Panasonic’s i-PRO Preferred 3 year warranty program for unmatched service enhancements and support.

i-PRO Extreme Camera LineUp A new array of 17 models of H265

cameras will be launched that support up to 3MP resolutions. The new cameras are differentiated by its use and specification, and are suitable for both indoor and outdoor use. Together with this camera, Panasonic is also launching an environmentally rugged camera, the Aero PTZ (pan, tilt and zoom), designed to combat severe weather conditions from rain to snow to extreme temperatures to gale-force winds, making it suitable for Sea Ports, Power Stations and Airports. The uniqueness of the i-PRO Extreme camera models include:

• • • • • • •

H.265 Smart Coding (Long GOP, Auto-VIQS, Smart Face Coding) H.264 Compatibility and mixed mode streaming, recording and viewing Auto Image Stabilisation  Secure Communication  Up to 4-Stream simultaneous H.265/264 encoding Enhanced Super Dynamic 144dB at 30fps (depending on model) Ultra-high sensitivity from

• •

0.008 lux to 0.015 in colour mode (depending on model) Touchable Rain Wash Coating (outdoor models only) Built in IR LED (up to 130 feet)

i-PRO Extreme Recorder WJNX400 The new WJ-NX400 recorder features H.265/H.264 recording, increased throughput and recording channel (up 128) capacity as well as an integrated GUI for PC-less applications enabling a complete Camera/Recorder/Viewing solution without the need for a separate PC client. i-PRO Extreme Video Management Application WVASM300 The new WV-ASM300 i-PRO Extreme H.265 Secure Video Management Software application is a powerful Windows® application that enables a secure, scalable H.265 ready, multi-camera, multirecorder surveillance management environment and is compatible with Panasonic’s legacy i-PRO line of H.264 cameras, recorders and encoders. sst

I’m All Ears: NEC Showcases the Latest Innovation In Biometric Security

T

okyo, Japan - NEC Corporation today announced the development of a prototype “hearable device” (earphone device) user authentication technology, aiming to achieve new forms of convenient, safe and secure computing. Security and safety are primary concerns when making use of any product or service. In recent years, as computers and smartphones have become more essential to daily life, reports of losses from leaked passwords and accidents related to smartphone use have become increasingly common. NEC’s hearable device user authentication technology helps reduce these risks by providing an additional layer of personalised security that allows users to devote greater attention to their surroundings.

The device is equipped with NEC’s unique otoacoustic authentication technology, which recognises the characteristics of a user’s ear in order to enable handsfree authentication of an individual. This enables users to safely and securely activate their computing devices, without distracting their attention to key in a password. In addition, the prototype’s motion sensor can be used to estimate user locations, even in indoor

continue on page 45

44

Security Solutions Today • September / October 2017


EYE ON ASIA | IN THE NEWS

environments where GPS signals are obstructed. This can help provide guidance to users who become lost in large facilities, such as shopping malls or airports. Moreover, since the device is situated in a user’s ear, it is subject to less shaking and noise when compared to wearable devices worn around the wrist or neck, enabling it to reliably obtain information. This also means it can recognise the orientation of a user’s face, a change in posture, or activities such as walking or running. In the future, it is expected to track pulse rates and other biometric information. This authentication device easily connects to a smartphone or other computing devices via BLE (Bluetooth Low Energy) in order to access the Internet and to take advantage of a wide range of services, including map sites for city guidance. Moreover, the device consists of a microphone, speaker, and a 9-axis motion sensor, which is equipped with

acceleration, gyroscope, and geomagnetic sensors. In order to promote the development of a wide range of services for the device, NEC will publicly provide application programming interfaces (API) for its otoacoustic authentication technology and indoor positioning technology, in addition to providing device manufacturers with design specifications for the hearable device prototype. “NEC is aiming to commercialise hearable platform services that combine individual authentication, indoor positioning, acoustic AR (augmented reality), vital sensing and other technologies by the end of 2018,” said Tomonori Kumagai, General Manager, Business Development Division, NEC Corporation. “Going forward, NEC will accelerate trials in collaboration with service providers and device manufacturers, while proposing new approaches to computing that utilise these technologies.” sst

Dahua Full Range of Penta-brid Video RecorderXVR-Integrates with Milestone XProtect VMS

H

angzhou, China — Dahua Technology, a world-leading manufacturer and supplier of intelligent security surveillance products and solutions, announced that full range of penta-brid video recorder (XVR) are integrated with the Milestone XProtect Video Management Software (VMS). Dahua XVR is a newly developed HD Video Recorder based upon industry leading open structure to be compatible with multiple access technologies. It is the perfect solution to upgrade existing video surveillance systems. XVR supports 4 mainstream analog camera types in the market, not only traditional CVBS (analog) camera, but also HDCVI, AHD and TVI , as well as IP camera. Moreover, XVR recognizes the signal formats from camera automatically, including both Dahua camera and third party camera. True plug & play makes operation more users friendly and convenient. All these features make XVR a true Penta-brid video recorder. Founded in 1998, Milestone Systems is a global industry leader in open platform IP video management software. The XProtect platform delivers powerful surveillance that is easy to manage, reliable and proven in thousands of customer installations around the world. With support for the widest choice in network hardware and integration with other systems, XProtect provides best-in-class solutions to video enable organizations - managing risks, protecting people and assets, optimizing processes and reducing costs. Currently, Dahua IPC, NVR, XVR and thermal cameras are all integrated with Milestone platform. In the meantime, integration with Milestone platform enables Dahua XVR to realize advanced performance such as live video, motion detection, edge-storage and PTZ control. Continuous cooperation with world-renowned VMS platform enterprises like Milestone is well in line with Dahua’s core value of Open and Integration. With a mission of “Safer Society, Smarter Living”, Dahua will continue to focus on “Innovation, Quality and Service” to server partners and customers around the world. sst

September / October 2017 • Security Solutions Today

45


IN THE NEWS | EYE ON ASIA

Taiwan Excellence Embarks On A Southbound Journey As It Debuts at CommunicAsia 2017 TAITRA expands visibility in the ASEAN market for 19 participating Taiwan Excellence Award winning brands including Acer, ASUS, Advantech, Planet, and VIVOTEK

S

ingapore – The Taiwan flag waved proudly at the opening of CommunicAsia 2017 as it showcased 50 Taiwanese technologies and innovations at the Taiwan Excellence Pavilion. This year’s inaugural participation at Asia’s premier sourcing and Information and Communication Technology (ICT) knowledge platform is part of the country’s drive to lend support to Taiwanese companies in achieving regional competitiveness within the ICT sector. According to the Taiwan External Trade Development Council (TAITRA), the initiative is a key component of the Taiwan Industry Image Enhancement Project (IEP). 19 Taiwan Excellence Award winning brands on display at booth BQ2-01 feature technologies in the areas of enterprise mobility, green energy, smart cities and the Internet-of-Things (IoT). Globally renowned Taiwanese companies Acer, Advantech, ASUS, Planet and VIVOTEK led the products showcase. Alongside these brands, Dr. Chiueh Tzi-Cker, Vice President & General Director of Information and Communications Research Laboratories at the Industrial Technology Research Institute of Taiwan (ITRI) spoke about integrating existing technologies and platforms in the push towards Smart Living. ITRI is part of the delegation led by the Taiwan Electrical and Electronic Manufacturers’ Association at booth BQ3-13. Mr. Francis Liang Kuo-Hsin, Representative of the Taipei Representative Office in Singapore, graced the Taiwan Excellence continue on page 47

46

Security Solutions Today • September / October 2017


EYE ON ASIA | IN THE NEWS

Pavilion’s maiden launch at CommunicAsia as its Guestof-Honour. In his opening address, Mr. Liang said, “Singapore is an important trade partner of Taiwan, and we have long established a strong and close bilateral relation between the two countries. Through Taiwan Excellence’s inaugural participation in CommunicAsia, we hope to promote partnerships, sharing of our cuttingedge technologies, and facilitate knowledge exchange between leading Taiwanese companies, innovators and members of the ICT industry in the Southeast Asia region”, affirming Taiwan’s focus in the region.

Addressing a room full of partners, media and guests, Mr. Scott Yang, Deputy Director of Marketing at TAITRA, shared that “many Taiwan manufacturers possess ground-breaking research and development (R&D) findings and record strong international sales. Aligned with the government’s initiatives, Taiwan Excellence aims to help these innovative products and brands break into the regional market in a bid to garner more opportunities for international cooperation.” Situated conveniently by the entrance close to CommunicAsia’s visitor registration, the Taiwan Excellence Pavilion features an interactive platform, offering visitors an up-close experience with the products on exhibit. This strategic location helps focus the spotlight on the innovative brilliance, further bolstering the eminence of the brands and the esteem in which they are held. Ranking 2nd in the world for three years on the trot and top in Asia in digital adoption encompassing areas such as consumer technology, e-commerce, financial services and interactive digital media and telecommunications, Singapore is the natural choice as a launch pad for Taiwan’s Digital Nation Plan and New Southbound Policy. Over the three days at CommunicAsia, the expected visitor turnout north of 30,000 flaunts officials, C-Level executives and international buyers. Working in this space, Taiwanese manufacturers can expect to present their latest technology innovations in pursuit of the Asia Silicon Valley vision of propelling Taiwanese manufacturers to the international forefront of IoT innovation. sst

September / October 2017 • Security Solutions Today

47


IN THE NEWS | EYE ON ASIA

NEC Opens New SA Global Security Intelligence Centre IT services giant NEC has opened its new $4.38 million Global Security Intelligence Centre in South Australia

S

outh Australia - The new centre is expected to create an estimated 50 highly-skilled jobs and forms part of NEC’s global cybersecurity network which the company says complements its security-focused facilities in Japan, Brazil, Singapore, the US and Austria. South Australia’s Minister for Investment and Trade Martin Hamilton-Smith said NEC is emerging as one of the state’s most prominent investors. “What we have here is a leading multinational IT company, recognising the advantageous business environment our state presents and making continual investments into South Australia.” “In this age of digitalisation, threats to our economic, personal and national well-being means cyber security must be effective across every aspect of our society, including government, business, defence and research domains. “This investment is therefore helping position South Australia as a global player in what is a growth industry. “The fact that NEC continues to invest in South Australia is reflective of the broader impact Investment Attraction South Australia has made in its short lifespan, securing nearly $1 billion in investments and creating nearly 5000 direct and construction jobs.” Along with the opening of the new security centre, NEC was recently awarded a contract by SA Police to

develop facial recognition software which NEC says will position the state’s police force as one of the most technically advanced in the region. And, NEC says its graduate programme is providing pathways for local technology students to enter the workforce and build a career with the company, and is a key component of attracting graduates to be located in its Adelaide office. NEC Australia chief operating officer Mike Barber said the new global security Intelligence centre in Adelaide is a key element of NEC’s global security business and reach, complementing facilities and activities in Japan, Singapore, Brazil, Austria and the US. The centre has received capital funding from NEC Japan and NEC Australia. “This security centre has been built and operates to high security certifications and standards required by governments and enterprises for the management and support of their data and applications. Zones are built for various levels of security and the zones and operations undergo rigorous assessment to achieve certifications,” Barber said. “One of the highlights of the global security centre is that it provides a vast suite of security services to local, national and international customers, from Adelaide. The centre is serving a market much larger than just South Australia with specialist skilled people located in Adelaide.” sst

Sasa Software receives Frost & Sullivan’s Asia Pacific 2017 ICT Security Vendor of the Year Award Gate Scanner® recognised by independent market research and consulting firm for proven success in preventing malicious attacks on Industrial Control Systems and other critical organisations.

continue on page 49

48

Security Solutions Today • September / October 2017


EYE ON ASIA | IN THE NEWS

S

ingapore – Sasa Software today announced that market research and consulting firm Frost Sullivan recognised the Gate Scanner® suite of security solutions with its 2017 Asia Pacific ICT (Industrial Control Systems) Security Vendor of the Year Award. The vendor of the year award recognises the outstanding performance by Sasa Software in the Asia Pacific ICT industry, and is decided by Frost & Sullivan benchmarking criteria that include revenue growth, market share, product innovation, breadth of solutions, and other achievements. Sasa Software has gained market acceptance in AsiaPacific with its proprietary Gate scanner® technology, offering it in form factors developed such as unidirectional gateways, kiosks and automated scanning solutions that have successfully provided industrial control systems security, and recently innovated to protect files transferred to public cloud environments. “With its strong overall performance, Sasa Software has been conferred Frost & Sullivan’s 2017 Asia Pacific Industrial Control Systems Security Vendor of the Year award”, wrote Frost & Sullivan Vice President ICT Practice Ajay Sunder. The award highlights the unique challenge solved by Sasa Software, described as a World of Zero Trust. State and non-state actors ceaselessly create unique

and targeted cyber-attacks that are capable of avoiding detection technologies, aiming to undermine and breach infrastructures. Instead of relying on detection, Gate Scanner® treats every incoming file and email as suspicious. Known as CDR – Content Disarm and Reconstruction, files are transformed into a new, neutralized copy that can be safely introduced into secure networks. The challenge is amplified in Industrial settings due to limitations in deploying traditional cyber security technologies, and has been proven to prevent advanced attacks, including APTs and ransomware. “This recognition by Frost & Sullivan illustrates importance and success of our approach. Network segmentation has long been a best practice in critical Israeli organisations, and is quickly being adopted in Asia. Gate Scanner® is a proven technology to allow transferring of files into secure networks, especially in critical and industrial settings”, said Yakov Yeroslav, Sasa Software’s founder and CEO. “Israel, Singapore and Asia, have a close and unique relationship, and we collectively implement the best practices in education, economy, and Cyber Security. By installing our solutions, critical infrastructure, industrial manufacturers and other organisations in Asia Pacific can benefit from the highest level of security available,” Yeroslav concluded. sst

WAMA Showcases State-of-the-art Solutions in Powerful Forum 2017

H

ong Kong - WAMA successfully showcased its latest CCTV technologies at “Powerful Forum 2017” which was held at the luxury 5-star Kerry Hotel in Hong Kong. The full day event organised by Powerful Industrial Ltd, the Hong Kong and Macao distributor of WAMA, consisted of a series of seminars, panel discussions as well as product showcases. Food and beverages were also served throughout the day and the event attracted a large turnout of visitors, including system integrators, installers, project consultants and end users from the security industry. continue on page 50

September / October 2017 • Security Solutions Today

49


IN THE NEWS | EYE ON ASIA

WAMA took the opportunity to showcase its stateof-the-art video surveillance solutions including the 12MP 360° fisheye camera, 4K compact dome IP camera, 4MP AHD camera, 4K professional NVR, as well as other advanced CCTV products. Many came to visit the booth to see the live demos of the equipment and were very impressed by the technologies of WAMA and its range of innovative products. “Hong Kong and Macao are very mature markets for CCTV solutions and so many players are coming from different parts of the world. We have been working very closely with Powerful’s team in establishing our brand in the region. Certainly, Powerful Forum 2017 was a wonderful event for attracting public attention on our offerings and making WAMA to stand out from the crowd”, said Dr Wallace Ma, CEO of WAMA Technology Ltd. All in all, WAMA received very positive responses during the event. With the growing support of industry partners both locally and overseas, WAMA is one step closer to becoming a renowned worldwide brand. sst

Dahua Technology and Microsoft Seek “Digital Transformation” to Link Global Cloud Market

H

angzhou, China - In the middle of July, the world-renowned 2017 Microsoft Inspire Global Partner Conference was held in Washington, D.C. Zhejiang Dahua Technology Co., Ltd. was invited to attend the conference, along with the world’s leading industry pioneers, experts, and innovators for in-depth discussions, to explore the new digital era’s hottest topics such as cloud computing, big data, Artificial Intelligence (AI) and their applications. Deputy General Manager of Dahua R&D Center, Mr. Yang Bin participated in the conference as a Dahua representative.

applications that link cloud computing, big data, AI, IoT, and related digital technologies. Dahua “Deep Sense” facial recognition technology has massively increased the efficiency and applications of big data in the field of video surveillance; deployment of Dahua facial recognition technology has also been very rapid in the fields of public safety, transportation, finance, and other industries. In May 2017, Dahua launched its Product of the Year – Intelligent Cloud Storage, which intelligently integrates video surveillance products to create an entirely new experience and promotes the development of video IoT.

As Microsoft CEO Satya Nadella mentioned at the conference, the global market is currently in the grip of a tide of digital transformation. Technologies such as Artificial intelligence (AI), the Internet of Things (IoT), big data and cloud are changing traditional business models. Facing 4.5 trillion USD digital business market, Mr. Yang Bin said that Dahua is committed to becoming a video-focused intelligent solutions and operational services provider, and to creating a safer society and a smarter life through multi-dimensional service chain

Dahua has been actively introducing advanced cloud technologies and constantly expanding its coverage in the video cloud sector. Dahua Cloud’s global linkage requires partnering with leading global cloud service vendors such as Microsoft (Microsoft Azure) and maintaining in-depth exchanges. It also requires the utilisation of innovative technologies such as big data services, intelligent recognition, machine learning and AI, to help guarantee high quality of products and services, as well as assist market expansion.

continue on page 51

50

Security Solutions Today • September / October 2017


EYE ON ASIA | IN THE NEWS

Mr. Yang Bin said, “Enterprise transition in the cloud era will require using the strength of our ecosystem to realize mutual benefit. In the future, Dahua Technology will combine the strengths of our global partners and build on a vision of global cooperative relationships to help the world’s economy complete the digital transition.”

Dahua is feeling confident to achieve business innovation and development together with Microsoft in the future, thus to seek digital transformation to link global cloud market. With a mission of “Safer Society, Smarter Living”, Dahua will continue to focus on “Innovation, Quality, and Service”, to serve partners and customers around the world. sst

September / October 2017 • Security Solutions Today

51


COVER FOCUS

Securing Smart CitIES Through Surveillance FF By: Axis Communications

Smart City Security: A Multi-Layered Issue As the world’s cities become ‘smarter’ – seeing an explosion in connected technology to deliver benefits to citizens and public bodies in the effective and efficient provision of public services – safety and security remain paramount. In a growing number of global cities, providing a safe and secure environment for their inhabitants is ever more challenging, not least due to the sad reality of terrorist attacks. The benefits of advances in surveillance technology, which not only support more effective post-event investigation by law enforcement

and security services but also enable prediction and prevention of incidents before they happen, are clear. However, less well recognised are the additional security risks created by the technologies being implemented in these so-called smart cities. As cities introduce more network and IP-connected devices without proper planning for each of these – surveillance cameras included – can provide an access point to local and city government IT networks for cybercriminals. The irony is, therefore, that technologies designed to make a city more secure can, in fact, create new vulnerabilities.

The Growing Importance of Growing Cities Cities represent an increasing share of population, GDP, and resource consumption across the globe, as new cities are created in fast-developing markets and existing ones grow in more developed countries. The ability for cities to use technology and data in innovative ways will create a competitive differentiation that drives sustainable economic development or revitalisation by creating jobs, increasing the standard of living, and attracting investment. Highlighting the importance of smart city technology, in 2016 analyst firm IDC predicted that: “By 2019, countries with 50 per cent of their midsize to large cities in the repeatable stage or higher of smart city maturity will be more successful in country digitisation efforts”.

52

Security Solutions Today • September / October 2017


COVER FOCUS

“In its 2016 study, 21 per cent of the local governments interviewed by IDC that were investing in the Internet of Things had already deployed a solution and were planning to expand their IoT footprint, 68 per cent were planning to initiate investing in IoT in the next two years and only 11 per cent were not planning to invest further in connected technologies.”

The effective running of city infrastructure is becoming increasingly reliant on technology and a fast-growing area of investment is in network-connected technologies, more commonly known as the Internet of Things (IoT). In its 2016 study, 21 per cent of the local governments interviewed by IDC that were investing in the Internet of Things had already deployed a solution and were planning to expand their IoT footprint, 68 per cent were planning to initiate investing in IoT in the next two years and only 11 per cent were not planning to invest further in connected technologies. However, as Massimiliano Claps, IDC EMEA’s Research Strategy Lead for Government Insights, points out, this growth in IoT technologies is a double-edge sword: “The potential benefits in creating truly smart cities in increasing efficiency, customer-centricity and safety of services, such as public safety, traffic and transportation, street lighting, education, health and social care, tourism and more is clear. But what is equally evident is that city government systems will become more attractive cyberattack targets. Indeed, our prediction that in 2017 at least one major city will suffer a cyberattack that will impact its short-term ability to effectively function seems to have been proven correct”. One example of the potential implications of this prediction occurred in Dallas, Texas, on April 8th, 2017, when all 156 emergency sirens in the city were activated

Axis offers intelligent security solutions that enable a smarter, safer world. As the market leader in network video, Axis is driving the industry by continually launching innovative network products based on an open platform - delivering high value to customers through a global partner network. Axis has long-term relationships with partners and provides them with knowledge and ground-breaking network products in existing and new markets. Axis has more than 2,700 dedicated employees in more than 50 countries around the world, supported by a global network of over 90,000 partners. Founded in 1984, Axis is a Swedenbased company listed on NASDAQ Stockholm under the ticker AXIS.

after an attack by a hacker, spreading panic among the population. The city’s 911 emergency call centre received around 4,400 calls in a short period of time, causing a backlog and forcing some callers to wait up to six minutes to speak with emergency personnel. In an environment where citizens are more conscious than ever of the potential for incidents and emergencies, such

September / October 2017 • Security Solutions Today

53


COVER FOCUS

attacks could cause widespread concern and diminish the trust in city systems and services.

Ensuring the Cyber Resilience of Video Surveillance Video cameras and feeds are critical assets for smart cities’ situational awareness, emergency response and dispatch, and investigation and enforcement. Smart city services like public security and safety, and traffic and transportation management are increasingly dependent on video. And their usage is expanding with the addition of body-worn, vehicle, private/corporate, and dronemounted cameras. But as network-connected devices themselves, videosurveillance solutions are not immune from the associated risks. Andrea Sorri, director of business development for government, city surveillance, and critical infrastructure solutions at network video leader Axis, accepts the providers of technology have a responsibility to help their customers design secure systems: “Video is a key element in enabling cities to go from simple situational awareness to situational intelligence allowing for prediction and, if appropriate, prevention. But technology is evolving at an incredibly fast rate, bringing not only new opportunities but also dangerous threats through cyberattacks.

Of course, it is in our interest to help advise city authorities on creating solutions that are secure from their foundations”. Essential strategies for ensuring that city video surveillance solutions are properly secured against cyber threats include:

• • •

Ensure that all city departments and ecosystem partners involved in implementing or using cityowned cameras, or feeding data to city command and control centres, comply with a standard set of security policies and guidelines. Architect the configuration and deployment of the end-to-end video solution, from device, to video management system, to video analytics to reduce security loopholes. Establish business continuity strategies for dealing with downtime. Collaborate with video-solution suppliers to understand how to leverage the most granular security capabilities, such as checking and upgrading firmware, setting user permissions, disabling services that may not be strictly necessary for certain use cases, enabling encryption, setting IP address filters, configuring SNMP monitoring, and more. Conduct regular penetration tests to assess unknown gaps and vulnerabilities of the expanding digital boundaries of the city ecosystem.

The security of safety and security systems – video surveillance primary among them – isn’t something to which many city authorities and government bodies may have paid much attention. But as part of the broader issues that come as almost every city looks towards the potential for the Internet of Things and connected devices in delivering more efficient and cost-effective services, it’s an area where prevention is going to be far more welcome than cure. For more information, please visit: www.axis.com sst

54

Security Solutions Today • September / October 2017


APPLICATION STORIES

Bosch Launches New Portfolio of IP Cameras

I

n today’s dynamic world, there isn’t a one-size fits-all video security solution. From retail to industrial, each business has unique requirements for video surveillance solution. A smart combination of the cameras offers solutions beyond security and to help users to make more informed business decisions to increase customer experience and their return on investment. Bosch launches a new range of fixed dome, bullet and box cameras from the new IP 4000i, 5000i and 6000 series offer resolutions up to 5 megapixel and low-light solutions like Bosch’s starlight technology. Next to that, these cameras now have Essential Video Analytics on board as standard. With video analytics, this means valuable data can be retrieved quickly from hours of stored video and you are alerted whenever it’s needed, providing improved levels of security 24/7. However, it doesn’t end there. In addition to advanced intrusion and automatic detection with timely alerts, it enables users to go beyond security and use video data to make more informed business decisions. For example, gathering business statistics such as counting the number of people entering or leaving the store while securing the main entrance or using video data to help enforce health and safety regulations. Triggering automatic alerts in case the number of people in a queue exceeds a certain level to improve service levels or identifying patterns in customer activity to optimise store layout and improve customer experience and sales, making these cameras perfect for small and medium businesses.

To ensure that captured video data meet the highest level of relevancy, the video analytics capabilities of these cameras need to go hand in hand with sufficient image quality. The cameras are available in a range of resolutions from 720p up to 5 megapixel with up to 60 frames per second. In challenging lighting conditions, the new fixed box and dome cameras offer Bosch’s starlight technology. This is combined with 1080p resolution and 60 frames per second to provide crisp and detailed color images in extreme low-light situations. This enables users to make use of the camera’s full video analytics capabilities, like color filtering, even in scenes with minimum ambient light. It substantially improves the levels of security and enables new opportunity to use. When light levels drop to zero, the cameras can offer a built-in infrared illuminator to allow users to detect objects (up to 30m) in complete darkness. With a High Dynamic Range these cameras ensure perfect exposure of (moving) objects - even in challenging, unevenly-lit scenes. Bosch constantly pushes the boundaries of technology to develop intelligent solutions that go beyond the highest security demands of today and deliver clear business advantages. As the customers expect from Bosch, all new IP 4000i, 5000i and 6000 cameras are simple to understand, easy to install, offer outstanding quality. sst

September / October 2017 • Security Solutions Today

55


FUN FACTS | THE INTERNET OF THREATS

Shopping Hacked Environment Hacked In 2001, An Australian man hacked into the Maroochy Shire, Queensland computerised waste management system and caused millions of litres of raw sewage to spill out into local parks, rivers and even the grounds of a Hyatt Regency hotel. As a result of the pollution, marine life died and the lives of citizens were affected immensely.

Hackers used malware to penetrate an heating, ventilation and air conditioning company working for Target and acquired personal data for more than 70 million customers, including the credit and debit card information of up to 40 million customers. According to security blogger Brian Krebs, that “third-party vendor” who Target had been piling the blame for the breach on was actually “a refrigeration, heating and air conditioning subcontractor,” for Fazio Mechanical Services. Apparently, the hackers stole Fazio’s login information and were able to access the Target network.

Vitek Boden is said to have made at least 46 attempts to take control of the sewage system during March and April 2000. Later investigations found Boden’s laptop had been used at the time of the attacks and his hard drive contained software for accessing and controlling the sewage management system.

S t a e r h T f o t d e e n T r R e A t n M I S t u O s r e k c a H n e h m e t W s y S the SMART Homes Hacked In October 2016, Hackers used internet-connected home devices such as CCTV cameras and printers to attack popular websites. Twitter, Spotify, and Reddit were among the sites taken offline on Friday.Each uses a company called Dyn - a DNS service or an internet “phone book” which directs users to the internet address where the website is stored, which was the target of the attack to direct users to its website. Security analysts believed the attack used the “internet of things” - web-connected home devices to launch the assault.. Such services are a crucial part of web infrastructure. The “global event” involved “tens of millions” of internet addresses. Security firm Flashpoint confirmed that the attack used “botnets” infected with the “Mirai” malware. Many of the devices involved come from Chinese manufacturers, with easy-to-guess usernames and passwords that cannot be changed by the user - a vulnerability which the malware exploits.

56

Security Solutions Today • September / October 2017


THE INTERNET OF THREATS | FUN FACTS

Nuclear Plant Hacked The US National Nuclear Security Administration who are responsible for managing and securing their nation’s nuclear weapons stockpile, experienced 19 successful cyber attacks during the four-year period of 2010 - 2014. “The potential for an adversary to disrupt, shut down (power systems), or worse is real here,” said Scott White, Professor of Homeland Security and Security Management and Director of the Computing Security and Technology program at Drexel University. Energy Department officials would not say whether any sensitive data related to the operation and security of the nation’s power grid or nuclear weapons stockpile was accessed or stolen in any of the attacks, or whether foreign governments are believed to have been involved.

Snacks Hacked In February 2017, an unnamed university was hit by a DDoS attack launched through vending machines, lights, and 5,000 other IoT devices, according to Verizon’s preview of its 2017 Data Breach Digest. According to Verizon, an incident commander noticed that “name servers, responsible for Domain Name Service (DNS) lookups, were producing high-volume alerts and showed an abnormal number of subdomains related to seafood.” While administrators were locked out, the university intercepted “the clear text password for a compromised IoT device over the wire and then use that information to perform a  password change before the next malware update.”

H20 Hacked In 2016, A “hacktivist” group with ties to Syria compromised Kemuri Water Company’s computers after exploiting unpatched web vulnerabilities in its internet-facing customer payment portal. The hack which involved SQL injection and phishing – exposed KWC’s ageing AS/400-based operational control system because login credentials for the AS/400 were stored on the front-end web server. Fortunately, based on alert functionality, KWC was able to quickly identify and reverse the chemical and flow changes, largely minimising the impact on customers. No clear motive for the attack was found. The same hack also resulted in the exposure of personal information of the utility’s 2.5 million customers.

Democracy Hacked Security firm Flashpoint reported that hackers attempted four Mirai botnet DDoS attacks in November 2016 against the campaign websites of Hillary Clinton and Donald Trump. Flashpoint detected four attacks in the 48 hours before election day. All four of them targeted the donation page on Trump’s website, and the last one also took aim at Clinton’s. Each lasted only 30 seconds. Why were they so short? “The most likely explanation is that it is a probe to see if the site will go down,” said Allison Nixon, Flashpoint’s director of security research. “If it does, the attacker may push out longer attacks. In this case, no downtime was observed, and no longer attacks followed.”

Healthcare Hacked In July 2015, hackers broke into the massive hospital network of the University of California, Los Angeles, accessing computers with sensitive records of 4.5 million people. Names, medical information, Social Security numbers, Medicare numbers, health plan IDs, birthdays and physical addresses all were potentially stolen, according to the university. Evidence collected by UCLA Health indicates hackers slipped into computers in September 2014. In an unprecedented move in August 2015 , the US FDA directed hospitals to stop using Hospira’s Symbiq Infusion System because it can be remotely accessed by hackers, allowing the unauthorised user “to control the device and change the dosage the pump delivers, which could lead to over - or under-infusion of critical patient therapies.” UCLA Health said the hack forced it to employ more cybersecurity experts on its internal security team, and to hire an outside cybersecurity firm to guard its network. sst

September / October 2017 • Security Solutions Today

57


APPLICATION STORIES

Axis Launches First Integrated, Open, IP-Based Mobile Access Control Solution with HID Global

A

xis Communications, the market leader in network video, will launch the integration of HID Global’s Mobile Access with its AXIS A1001 Network Door Controller and AXIS Entry Manager software at IFSEC International 2017, which takes place from June 20-22 at London ExCeL. The Axis and HID mobile access control solution meets business demands to support mobile-enabled workforces. The solution enables mobile devices such as smartphones to function as credentials, allowing people to gain access to secured buildings, rooms and areas. Mobile devices and smartphones are ubiquitous today and their functionality continues to advance to include an ever more diverse set of applications, from contactless payments to health tracking. By integrating HID Global’s Mobile Access with its software and door controller, Axis has created a solution which combines the convenience expected in a mobile-first world with the levels of security demanded by businesses and their employees.

“Axis and HID are both well-known, global brands that are partnering together to develop open, IP-based secure access solutions. Mobile credentials are finally gaining greater acceptance and adoption thanks to an increasingly mobile-first perspective. This mobile access control offering demonstrates Axis’ innovative solutions to the market in partnering with a leader such as HID. It is an easy-to-deploy, easy-to-use solution,” says Stephanie Hensler, Axis Communications Director of Business Development, Access Control.” 

The HID and Axis mobile access offering is the first IP-based, end-to-end solution. It encompasses everything necessary for small-, medium- or enterprise-sized organisations to deploy mobile access control.

continue on page 59

58

Security Solutions Today • September / October 2017


APPLICATION STORIES

The solution includes: Axis

AXIS A1001 Network Door Controller, which makes yes/no decisions about who may enter, in which areas and at what times AXIS Entry Manager access control software, which is integrated with HID Mobile Access® Portal and used to set up the systems, add new users and manage mobile IDs

HID Global: • HID iCLASS SE® and/or multiCLASS SE® readers • HID Mobile Access® Portal • HID Mobile Access® App, which is available through the Apple® App Store and Google® Play 

 The solution stores secure identities on smartphones for opening doors and locks instead of managing traditional printed identity credentials. This improves convenience for end users and represents a more cost-effective and simpler way to manage credentials. It also provides the highest levels of security and privacy protection available in access control. The integration features AXIS Entry Manager software to manage all connected AXIS A1001 Network Door Controllers as well as the HID cloud-based portal to manage users and mobile IDs. Other third-party software can also be used for integrating more advanced access management functionalities. sst

Ivory Coast: A Pioneer in Student Identification in Africa

J

ust over 1.3 million highly secure student ID cards are issued to all middle and high school students at almost 2,000 public and private schools across Ivory Coast every year since 2012. The student ID cards are printed at the Ministry of National Education & Technical and Professional Training with the plastic card personalisation and printing systems from Evolis. Ivory Coast is the first African country to have introduced a student ID system. The cards enable the ministry

to keep track of the school curriculum of every student, secure access to exam rooms, and produce reliable statistics on the number of students in real time. In short, the student ID card has become a way to certify that students are well and truly recognised in the national database. Around 40 Dualys printing systems were installed at the ministry in early 2013 and have since been deployed by IBSF, an Evolis partner based in Ivory Coast. In 2017, IBSF ordered again 20 Primacy Duplex systems and 15 Primacy Lamination to round off the continue on page 60

September / October 2017 • Security Solutions Today

59


APPLICATION STORIES

ministry’s fleet of printers. A specialist in computer engineering, IBSF developed the software interface of the systems, which makes it possible to personalise and print 30,000 cards per day between September and December of each year. At the start of every academic year and across the entire country, agents gather student enrollment data and take ID photos using about a hundred registration kits containing a computer and webcam. This data is then processed and synchronised on the ministry’s central server, and the ID cards are created and printed.

of Strategies, Planning and Statistics of the Ministry of National Education & Technical and Professional Training of Ivory Coast relayed his reasons behind wanting to centralise the issuance of student cards. He said that by opting to collect data in a centralised way and printing individual highly secure cards, he hoped to improve the reliability of statistics on school enrollments, control access to exams and deliver student ID cards more quickly. Now that this process has been introduced, they always manage to achieve their objectives.

Minimising Identity Fraud with Encoded and Laminated Cards

Mr Fofana also conveyed that Evolis systems are particularly fast and reliable and thanks to their level of quality and the highly professional annual maintenance The student ID cards contain the name and photo of provided by the Evolis partner based in Ivory Coast, the student and a QR code in which his or her personal there have been no failures. He added that the fact that details are encrypted. The cards are then laminated using the systems are produced in France is also an argument the Evolis Primacy in favor of Evolis as Lamination system this not only ensures and a hologram is the high quality of “The student ID cards contain the name and added to ensure a high the products but also photo of the student and a QR code in which his level of security. The geographic proximity risk of identity theft is and a Frenchor her personal details are encrypted. The cards therefore minimised. language aftersales are then laminated using the Evolis Primacy service. With the Lamination system and a hologram is added Students receive their Evolis systems, the to ensure a high level of security. The risk of ID cards automatically cards are guaranteed identity theft is therefore minimised“. after enrolling online to be printed in the and being accepted by given time and with one of the recognised added security. institutions. No payment is required for this service. The new centralised process has also enabled them to Before the introduction of this ambitious project, provide a better service to families, who now receive student cards used to be printed directly by the individual the student cards automatically and free of charge after schools, mostly on cardboard with few security their children have been registered. The card’s security elements. Given that this system was decentralised, the elements ensure that they can also prevent duplicate same ID number was sometimes issued twice and the enrollments and combat identity theft more effectively cost of the cards varied from school to school. and the student ID cards are also used for large-scale exams and, if necessary, police checks.

Client Testimonial

Mr. Mamadou Fofana, Director of the Department

For more information, please visit: www.evolis.com sst

Do you have stories for us?

Good! Email us at sst@tradelinkmedia.com.sg 60

Security Solutions Today • September / October 2017


APPLICATION STORIES

Axis Enhances Zipstream to Embrace New 360° Cameras and 4K Resolution

A

xis announces enhancements to its Zipstream compression technology to support the increased data streaming and storage demands of 360-degree panoramic cameras and 4K resolution. Zipstream ensures that important forensic details of video footage are maintained, while minimising bandwidth and storage requirements by an average of 50% or more. Axis also announces two new domes that include the enhanced Zipstream, offering 360-degree, high-resolution coverage, costeffectively.

to customers with more limited means. Featuring an attractive, smaller design than their predecessors, the new cameras are flat and subtle, without any dome over the lens, which makes them more discreet and eliminates the risk of reflections in the dome. Smoke-detector and vandalresistant casings, as well as a black casing are offered as accessories for both cameras. The cameras support both camera-side as well as client-side dewarping. The smooth client-side dewarping in AXIS Camera Station or other video management systems can be easily performed in live view or on recorded material of the full 360° overview.

Customer demands for video surveillance can appear contradictory: an increasing desire for improved quality, resolution and coverage, with a simultaneous need to AXIS M3047-P, with a 6-megapixel sensor, and AXIS control costs in relation to bandwidth and data storage. M3048-P, with a 12-megapixel sensor, both deliver full The response from Axis Communications, the market frame rate video, excellent image quality including leader in network video, overall sharpness and is to continually develop light sensitivity. its unique Zipstream   video compression “Combining these new “The new cameras are flat and subtle, technology, to embrace the 360-degree domes with without any dome over the lens, which developments in network the enhanced Zipstream makes them more discreet and eliminates camera capabilities. technology really does the risk of reflections in the dome.” deliver a cost-effective “Storage and bandwidth solution for customers, make a significant part providing comprehensive of the total cost of a coverage while ensuring surveillance system. Axis developed Zipstream to the detail of that panoramic view is not lost when address the specific needs of the security industry. streaming and storing data,” added Petra Bennermark, That is, to minimise these requirements without Global Product Manager, Axis Communications. losing forensic details”, said Johan Paulsson, Chief   Technology Officer at Axis Communications. “We are AXIS M3047-P and AXIS M3048-P are planned to be happy and proud to announce that the enhancement available through Axis’ distribution channels in June of Zipstream now embraces both panoramic and ultra2017 to the suggested retail price USD 469 and USD 669 high resolution cameras.” respectively.     Axis also announces AXIS M3047-P and AXIS M3048-P The enhancements to Zipstream were showcased Network Cameras, which take advantage of the together with above-mentioned panoramic cameras enhanced Zipstream technology to deliver 360-degree and as well as new 4K cameras at IFSEC International coverage in a cost-effective way. They are compact fixed 2017, which took place from June 20-22 at London mini dome ‘fisheye’ cameras giving complete coverage ExCeL. sst

September / October 2017 • Security Solutions Today

61


APPLICATION STORIES

A Smart City in China: Bosch to Make Tianjin Intelligent Strategic cooperation agreed

F

rankfurt, Germany – The Bosch Group is to be part of one of China’s pioneering smart-city projects: on June 20, the leading global supplier of technology and services signed a strategic cooperation framework agreement with the city of Tianjin. The aim of the alliance is to explore possibilities for putting the “Smart Tianjin” initiative into practice. The Chinese port is to be made into a smart city. Attending the signing ceremony, which took place during the Tianjin-Frankfurt Cooperation Forum, Peter Tyroller, the member of the board of management of Robert Bosch GmbH responsible for Asia Pacific, said: “China’s new urbanization has put smart-city

solutions on the map as one of the key drivers of urban development. Cities need to provide increasing levels of convenience, energy efficiency, and security. We are pleased to have the opportunity to offer Tianjin our connected solutions as a way of improving quality of life and creating an economically more efficient city.” With the sensors, software, and services the Bosch Group provides as an innovation-driven IoT company, it is well positioned to help take China into the smartcity era.

Tailor-Made Solutions for the Needs of “Smart Tianjin” In the rough triangle encompassing Beijing, Tianjin, and

Hebei province, China is planning an international metropolitan area. With more than 15 million inhabitants, Tianjin will be an important industrial center and transport hub within this area. With this in mind, the Tianjin municipal government has set up a “Smart Tianjin” initiative. As part of this initiative, Bosch will design a smart-city blueprint for Tianjin, sharing and leveraging experience accumulated in other international smart-city projects, and taking local needs into consideration. To be closer to its client, Bosch will set up a project office in Tianjin.

Bosch Smart-City Solutions For Mobility, Energy, Buildings, Security, and E-Governance

continue on page 63

62

Security Solutions Today • September / October 2017


APPLICATION STORIES

Bosch will contribute the knowhow it has gained so far from other smart-city projects, including San Francisco, Singapore, Stuttgart, Berlin, and the Hamburg docks. For smart cities, Bosch offers solutions in the areas of mobility, energy, buildings, security, and e-governance – in other words, digital city administration. In the mobility sphere, its solutions include environmental monitoring, connected parking, fleet management, e-mobility, and multimodal transport. When it comes to energy, the range includes virtual power plants, energy-efficient heating, hot water,

and cooling systems, as well as energy storage units. The security solutions encompass systems for fire protection, access control, and video surveillance. For residential buildings, Bosch provides smart home technology and connected household appliances. As for e-governance, the range includes the community app and the city data platform.

Bosch in China In 2016, the Bosch Group recorded sales of 12.5 billion euros in China. This means that the supplier of technology and services increased

its sales by 12 percent year on year, a rise of 19 percent in local currency. With some 59,000 associates, China is also home to Bosch’s largest workforce outside Germany. Bosch has been active in China since 1909, and all four of its business sectors are now represented there. The Bosch Group also sees great potential in China for its business with IoT connectivity – not only in the area of smart cities, but also in the fields of connected mobility and the industrial internet. For more information, please visit: www.bosch.com sst

Dahua Smart City Solutions

H

to check but also due to the advanced traffic system that can easily transport one person to anywhere. Not to mention all sorts of inconvenience for ordinary citizens in such an operation.

Time to do it Smartly!

Boasting its AI technologies and highly integrated platform, Dahua Smart City Solution aims to address safety issues of mega-cities without dramatically expanding police forces. To be more specific, the deep-learning empowered video surveillance performs timely and effective risk detection. The unified platform allows faster emergency response and the powerful data mining helps to get more

angzhou, China - Ever expanding, cities today must pay more attention to protect the people and properties gathered. It is evident to anyone with access to global news that now even the most developed cities are faced with huge safety threats, ranging from terrorists’ attacks aiming at well-populated areas and historically significant places to road accidents that keep increasing with the number of automobiles. A smart and integrated system for urban security is in urgent need, which Dahua is competent to provide.

In the past, the administration was heavily reliant on man power and so the investment mostly went to increase the number of people dealing with problems. However, this no longer works since the population and data have exploded in the process of urbanisation. The huge expanse on man power is disproportionate to the satisfactory result achieved, especially when concerning safety. For example, now it must take more time for more policemen to track down a suspect in a big city not only because there are too many people and places continue on page 64

September / October 2017 • Security Solutions Today

63


APPLICATION STORIES

Dahua Smart City Solution aims to address safety issues of mega-cities without dramatically expanding police forces. To be more specific, the deeplearning empowered video surveillance performs timely and effective risk detection. insights from the data front-end systems collected. Combined together, Dahua Smart City Solution gives you unprecedented advantages. For example, the deep-learning redefines the capabilities of video analysis we know. Ranked No.1, Dahua achieved 99.78% facial recognition accuracy in LFW (Labeled Faces in the Wild, a well-known facial recognition benchmark for academic purpose) in October, 2016. Moreover, deep-leaning even allows instant classification of human and vehicle appearing in video, capturing extract detailed features such as clothe color, gender, headwear, bag for human and license plate number, vehicle color, size, mark, model, cellphone usage, seat belt usage for vehicle.

Four Working Stages of Dahua Smart City Solution The overall working process of Dahua Smart City Solution can be viewed in four stages that are prevention, detection, response and investigation.

By improving each, Dahua Smart City Solution can improve the city running in general. The stage of Prevention means picking out and focusing on potentially dangerous persons and factors before they really do harm to public safety. This requires the ability of collecting and analysing big data. Dahua’s smart city solution provides advanced forecasting models that give a better chance of predicting events. For example, with comprehensive analysis of violation data collected by traffic enforcement cameras, the system can generate a watch list for the vehicles with numerous violation records. The stage of Detection means real time surveillance in various forms, including deployment of 360-degree panoramic camera and ultra-long range, all weathers monitoring thermal camera, etc. In addition to multifunctional cameras above, Dahua’s deep-learning empowered smart video surveillance can automatically detect risky individuals and activities from massive data collected. In fact, Dahua traffic enforcement system helped Hangzhou city automatically detect 29,823 vehicles’ illegal behavior during G20 Summit, which greatly reduced the burden on policemen who thus could put more focus on protecting key summit area. The stage of Response means enabling key organisations in the city to react to security threats in real time. Now is the time for authorities to act against possible escalation of the incident. For continue on page 65

64

Security Solutions Today • September / October 2017


APPLICATION STORIES

In addition to multifunctional cameras above, Dahua’s deep-learning empowered smart video surveillance can automatically detect risky individuals and activities from massive data collected.

which purpose, Dahua improves the communication efficiency through its integrated platform, allowing unified command and centralized data storage as well as cross-department information sharing. Suppose, if a natural disaster took place in the city, Dahua Smart City Solution could would report it on a single e-map with available emergency response resources to all relevant departments and agencies, while providing seamless monitoring of the site to all units approaching.

investment declined by 10% yet the criminal activity prevention score actually improved by 0.5% since 2015.

The stage of Investigation means being able to quickly analyze all data collected by different systems and provide insights to facilitate the recovery of crucial incident like crime after it happened. In this stage, technologies such as video synopsis provide a short summary including all moving objects of a long video and supports query moving object according to different characteristics like size, color, direction and speed. Besides, there’re a rich set of data mining methods like active area analysis, active target analysis and trajectory analysis. So if a criminal tried to escape with different clothes or cars he was highly unlikely to make it in a city equipped with Dahua Smart City Solution.

Social benefits assess the ability of the public to enjoy entertainment and leisure activities safely and how their affinity for the government changes.

Multidimensional Benefits Smart City Solution delivers on Dahua’s promise of “Safer Society, Smart Living” in 4 key metrics as following: Government investment measures the level of continued commitment by governments to maintain good function and development of systems in place. After deploying smart city solution, London’s police

Safety result measures changes in the levels of crime and risk to citizens. It also assesses the public’s perception of how well the city’s authorities can respond to incidents. This is improved by the efficiency savings that Dahua’s surveillance systems provide.

Economic benefit accounts for personal wealth, spending on tourism and retail along with employment rates and the city’s protection against short-term economic fluctuations. Smart city solutions benefit everyone in all four aspects above. Governments can decrease spending and crime rates at the same time whilst increasing citizen safety, survival rates and citizen approval rating. Citizens will be safer and enjoy better living standards without the burden of increased public spending. In short, they will be happier with both the government and their lives.

Summary By remaining ahead of the market with expertise in intelligent visual processing technologies and emphasising its core value propositions of innovation, quality and service, Dahua Technology will continuously contribute to a safer society and smarter living, benefiting city dwellers worldwide. sst

September / October 2017 • Security Solutions Today

65


APPLICATION STORIES

Comelit’s Award-Winning IP Door Entry System Chosen for Battersea Power Station Development

Residents at one of London’s most iconic riverside developments – Battersea Power Station – are using a state-of-the-art IP video entry system from Comelit.

R

esidents at one of the UK’s most iconic and keenly sought-after developments – Circus West at Battersea Power Station in London – are using a state-of-the-art IP video entry system from Comelit. With designs that are both aesthetically stylish and technically sophisticated, it is little wonder that the new development has attracted attention from potential purchasers from all over the world. The door entry system from Comelit selected to provide access to the site offers the cutting-edge design and ease of installation that perfectly mirrors the expectations of the aspirational clientele who will soon call the Battersea Power Station development home.

Vandalcom single button panels. User-friendly help points have also been fitted in car parking areas to enable residents to communicate with the concierge/ security office.

Phase 1 of the ground-breaking development comprises of 865 apartments at the Circus West site and features Comelit’s IP-enabled ViP entry system that resides on a shared network. The apartments are fitted with ICONA monitors, while more than 50 entrances are equipped with a mixture of 3one6 Sense flush-mounted panels, Vandalcom digital panels and

Award-Winning Entry Panels

The ICONA monitors inside each apartment feature a 16:9 4.3-inch colour screen with capacitive, touchscreen and swipe activation. Available in flush-mounted, wallmounted and desktop versions, these concave-shaped, satin-finished monitors have high acoustic fidelity, while the monitors sport clean and elegant styling in scratch-resistant polycarbonate and brushed metal edges, complementing the contemporary and striking design of the apartment interiors.

The 3one6 entrance panels comprise a contemporary, intuitive and highly customisable solution. They feature an LCD graphic display, housed in 4mm mirrorfinish or brushed steel, and concealed loudspeaker. Winner of several design awards, 3one6 Sense was the continue on page 67

66

Security Solutions Today • September / October 2017


APPLICATION STORIES

first entrance panel to use capacitive technology.

bar, private dining area, library and screening room.

Harnessing the benefits of IP technology, the ViP system is integrated into the development’s shared network, enhancing the performance of video communications. The network itself, supplied by Skanska Konnect, incorporates the site’s access control system, as well as the Comelit video entry system, which comprises over 900 devices. Being IP-based, the system has no distance limitations and can provide an unlimited number of users with simultaneous video and audio communications.

“We are absolutely thrilled to have been chosen to take part in this iconic and exceptional project,” said Francesca Boeris, Comelit’s Managing Director. “With our emphasis on cutting-edge product design and aesthetics, we are proud to be associated with a development which showcases some of the best designers in the world.”

About Comelit

For more than half a century Comelit has The on-site concierge been a leading global is able to manage calls Harnessing the benefits of IP technology, manufacturer of video made from call points to and audio door entry apartments, and can also the ViP system is integrated into the products. The company directly call individual development’s shared network, enhancing offers the most upapartments. Residents the performance of video communications. to-date systems in the are also able to contact industry and these the concierge via the continue to evolve intercom directory on as technology moves their ICONA monitors, forward. Comelit designs and manufactures classand can communicate with the other apartments via leading video door entry panels and monitors, IP and the same directory, which can be programmed by the analogue high-definition surveillance solutions and installer on request. domestic Home Automation systems.

Circus West and the Rest

Due to open this summer, Circus West is going to be one of London’s newest residential sites, located between the historic Power Station itself and the 200acre Battersea Park. As well as the apartments situated within eight blocks, the development will feature a select range of independent shops, restaurants and cafes at Circus West Village. Residents will also have access to private gardens and a residents’ club with a

Comelit products are sold in over 70 countries worldwide through an extensive technical and sales network. Their quality is guaranteed by cutting-edge technological research, ongoing optimisation of functional and application processes and purebred Italian design. For more information, please visit: www.comelitgroup.com/en-gb/ sst

Securing Retail with Dahua Security Solutions

W

ith the impact of a rapidly developing online shopping industry through PC and mobile devices, retail stores are facing great challenges. In a fiercely competitive market, enlarging the customer base and maintaining their loyalty become increasingly important and at the same time – very difficult. Improving customer satisfaction, maximizing per-customer transactions, ensuring a safe environment, and reducing unnecessary loss have become a major focus of retail owners and chain store companies.

Dahua Retail Security Solution Dahua Technology, a world leading provider of intelligent video surveillance products and solutions, launched the Dahua Retail Security Solution. Dahua Retail Security improves customer satisfaction, secures the shopping environment, and optimises business results – which keep OPEX low, enhance store operating efficiency, and increase profits. The solution is customised for you. continue on page 68

September / October 2017 • Security Solutions Today

67


APPLICATION STORIES

Dahua Retail Security Solution Technical Highlights People Counting &Height Detection The 3D Camera provides people counting and height detection functionalities. It calculates foot traffic at the store entrance, and supports the export of daily / monthly / yearly reports, providing highly valuable data as a reference for future business decisions. POS (Point of Sales) Integration The video feed and corresponding POS information can be shown simultaneously, both in the realtime and in playback mode. Text search is supported to retrieve specific order and associated video recording data. Super WDR Dahua Ultra Smart series cameras provide up to a 140dB Wide Dynamic Range for obtaining a crystal clear image even in high contrast, sunny environments. Clearly monitor store entrances under various conditions, day or night. Heat Map Fisheye cameras provide Heat Map functionality for areas throughout the store, helping businesses analyse and adjust to customer traffic. A fisheye camera also can capture images around the store floor. Dewarping Modes Dewarping modes allow fisheye cameras to capture a full view of the stores. One fisheye camera has a field of view equivalent to 8 standard cameras. Corridor Mode Corridor mode is suitable for narrow shopping aisles, enabling minimal camera usage to monitor the same area.

Application Areas Entrance Port People counting &Height Detection helps retail stores acquire customer flow data,

68

enabling them to manage and operate according to data like an e-commerce storefront. Store Floor As a major area center of the shopping experience and customer traffic, the shelf area tends to have differentiated visitor flow and requires great efforts in enacting security measures. Monitoring coverage contributes to reducing theft of customer property and retail goods, providing a reassuring shopping environment. Meanwhile, visitor flow data helps shopkeepers understand visitor flow distribution so they can prolong the time of customer stay and visitor flow coverage by rearranging goods and shelves. Checkout Counter Customer disputes and salesperson fraud occur frequently at the checkout counter. High-definition video, audio, and POS overlay can improve identifying the cause of problems. Store Room Starlight cameras make sure your store room is under careful surveillance 24-hours a day, performing well under any lighting conditions and greatly reducing the probability of being robbed. Day and night, starlight cameras provide complete coverage of the store room, preventing theft. Office

DSS

Security Solutions Today • September / October 2017

business

analysis

application scenarios are mainly used to help retailers manage the store more efficiently with valuable data. It utilises data processing to reduce time & labor cost, and relies on a visualisation of various data to get an intuitive understanding of previous and current status of the store as well as its future trend. Remote Access At the same time, with remote access to the management client in Dahua DSS (Dahua Security Software), managers can view the latest store information and access video through mobile devices even when they are on business trips.

Summary The Dahua Retail Security Solution provides more details without blind spots, ensuring the safety of your employees, customers, and property. It also helps provide valuable statistics to aid your future business decisions. It is cost-effective, customisable, and cross-functional, and is an ideal solution for retail shop owners and chain store companies. With a mission of “Safer Society, Smarter Living”, Dahua will continue to focus on “Innovation, Quality, and Service” to serve partners and customers around the world. For more information, please visit: www.dahuasecurity.com sst


APPLICATION STORIES

Huawei Showcases Collaborative Public Safety Solutions at INTERPOL World 2017
 Company Signs Five New Agreements to Expand Public Safety Ecosystem

U

nder the theme of “Leading New ICT, the Road to Collaborative Public Safety”, Huawei participated in INTERPOL World 2017 for the first time. INTERPOL World 2017 which took place in Singapore from July 4-7, 2017, provided a strategic platform for public and private sectors to discuss and showcase solutions to evolving global security challenges. During the trade exhibition, Huawei together with its partners demonstrated its Collaborative Public Safety solutions enabling public safety agencies to advance digital transformation through a new level of connectivity and engagement to safeguard communities. During the event, Huawei also held an exclusive Collaborative Public Safety Forum, where it signed a Memorandum of Understanding (MoU) with Agent Video Intelligence (Agent VI), IPSOTEK, Xjera Labs, Thuraya Telecommunications Company, and Ascent Solutions. Under the five separate agreements, Huawei aims to jointly develop innovative industry-specific solutions and expand the Collaborative Public Safety ecosystem.

Demonstrating Collaborative Public Safety Solutions with Leading Partners At Huawei’s booth in the exhibition area, Huawei together with 18 partners including Hexagon, NVIDIA, Yitu, Xinyi, and GSafety, showcased its Collaborative Public Safety (Collaborative C4ISR or C-C4ISR) solutions

based on cloud computing, Big Data, IoT, broadband trunking, and other leading technologies. The solutions included a collaborative command and control center (C- Command & Control), a collaborative communications network (C-Communication), a collaborative cloud platform (C-Cloud), a collaborative video cloud platform, and a collaborative IoT platform (CReconnaissance). Together with Yitu, Sensetime, Harzone, MIMOS, and other partners, Huawei demonstrated a cross-domain sharing video cloud solution. Working with GSafety, DHI, Whisper and other companies, Huawei also showed a crisis and disaster management solution based on IoT and Big Data.

Industry Partner Collaboration to Advance Transformation of the Public Safety Industry


Digital

Huawei’s exclusive Collaborative Public Safety Forum gathered the company’s executives, customers, partners, industry experts, and analysts to share their insights on the challenges of maintaining public safety, discuss ways to promote the digital transformation of the public safety industry, and exchange safe city best practices. During an opening speech, Xu Xujing, President of Public Safety of Huawei Enterprise Business Group, said: “In the digital era, technological advances are generating new and evolving public safety threats which cannot be tackled using traditional reactive approaches. Multiple agencies, regions, governments, enterprises, and communities need to work together and move towards the road of collaborative public safety. Based on the C-C4ISR philosophy, collaborative public safety encompasses the key areas of prevention, detection, response, and recovery. C-C4ISR uses technologies continue on page 70

September / October 2017 • Security Solutions Today

69


APPLICATION STORIES

Disaster Management solution, and jointly develop Safe City solutions with Ascent Solutions. Thuraya’s advanced satellite network provides coverage in the most remote locations, ensuring uninterrupted service across two-thirds of the world — over land, air and sea.

such as Big Data, IoT, cloud computing, and intelligent video analytics, and enables “device, pipe, and cloud” synergy as well as integration of ICT infrastructure capabilities and industry-leading ecological service systems. This helps the authorities better address public safety threats to safeguard citizens.” At the forum, Huawei and five industry-leading enterprises signed individual MoUs, committing to jointly develop solutions at Huawei’s Singapore OpenLab to accelerate the development of the public safety industry. In the area of video cloud, Huawei has established new partnerships with Agent Video Intelligence (Agent Vi), IPSOTEK, and Xjera Labs. Agent Vi is the leading global provider of open architecture, video analytics solutions. Agent Vi’s comprehensive offering includes software products for cloud- based SaaS and on-premise installations, with capabilities ranging from real-time video analysis and alerts to video search and big data applications. IPSOTEK focuses on scenario-based video analysis, including intrusion detection, collection and investigation of evidence, people flow management, and other scenarios. It can accurately describe a target’s behavior using a combination of scenarios, increasing the reliability of police reports and significantly reducing false alarms. Xjera Labs is dedicated to the development of image and video analysis solutions based on artificial intelligence (AI).

“This partnership is an exciting opportunity to merge efforts in advancing public safety systems and develop agile solutions for faster, more reliable collaborative search and rescue efforts,” said Jassem Nasser, Chief Strategy Officer at Thuraya. “We have a proven track record of establishing vital communication links in relief, civil defense, SAR and ISR missions and are determined to continue being a trusted partner for enhanced global satellite communication pathways.” Lei Hui, CEO of Huawei Singapore, and Xianzheng Nie, Director of Asia Pacific Solution Development Center, Huawei Enterprise Business Group, attended the MOU signing ceremony. Xianzheng Nie said: “Based on our Platform & Ecosystem strategy, Huawei establishes OpenLabs in countries focused on advancing industry innovation. We also aim to accelerate digital transformation of industries through our customeroriented joint innovation centers, solution development centers, regional industry ecosystem development centers, and industry experience centers in key cities across the region. The Singapore OpenLab focuses on core areas such as Safe City and Smart City and works with 20+ partners to develop C-C4ISR solutions such as video cloud and crisis and disaster management solutions to drive public safety digital transformation and better serve customers in the South Pacific region.”

Leading the Discussion on Digital Transformation of Public Safety Agencies On July 5, Hong-Eng Koh, Global Chief Public Safety Expert, Huawei, delivered his keynote speech titled “The

Commenting on its MoU with Huawei, Agent Vi’s CEO, Mr. Itsik Kattan, said: “The partnership between Agent Vi and Huawei will combine our expertise to jointly create solutions for safer and smarter cities. Through this cooperation, municipal customers will be able to access the most innovative and advanced technologies, allowing them to better serve and protect their citizens.” Under their respective MoUs, Huawei will also work with mobile satellite service carrier Thuraya Telecommunications Company on a joint Crisis and continue on page 71

70

Security Solutions Today • September / October 2017


APPLICATION STORIES

Road to Collaborative Public channels across geographies Safety” at the INTERPOL spanning an entire lifetime. “In the digital era, the amount of World 2017 Congress. Mr. Huawei’s Cloud Solution, data to establish the unique Digital Koh discussed the rapidly FusionSphere, is able to Identity of an individual will grow evolving public safety meet the evolving and exponentially with information landscape and that a single unpredictable demands becoming available in multiple forms agency cannot uphold public of Digital Identity through various channels across safety and maintain safe management.” geographies spanning an entire cities on its own, especially with perpetrators leveraging With Huawei’s Collaborative lifetime. Huawei’s Cloud Solution, platforms to widen their Public Safety solutions FusionSphere, is able to meet the ecosystems of like-minded based on the principle of evolving and unpredictable demands individuals. He pointed out “Openness, Collaboration, of Digital Identity management.” that “Collaborative Public and Shared Success”, Safety” which involves Huawei is committed to leveraging digital platforms working closely with worldbuilt on technologies such as IoT, Big Data, cloud leading industry partners, such as in consultation and computing, SDN and LTE to drive engagement across planning, system integration, and software applications. agencies, borders and communities. Huawei works with partners to develop a mature Public Safety ecosystem and build one-stop solutions for Augustine Chiew, Global Public Safety Expert, Huawei customers. Huawei’s Safe City solutions are serving Enterprise Business Group, also delivered a presentation about 800 million people in more than 200 cities of over at the Congress on Cloud Enabled Digital Identity 80 countries globally, covering Europe, Africa and Asia Management. He said: “In the digital era, the amount Pacific. of data to establish the unique Digital Identity of an individual will grow exponentially with information For more information, please visit Huawei online at becoming available in multiple forms through various www.huawei.com sst

Secure Our City, Inc. Increases Parking Security with Farpointe Long Range Reading Solution Parking Garage Used by Boston Area Healthcare Organisation Required More Control

S

unnyvale, California, USA - Farpointe Data, the access control industry’s OEM for RFID solutions, today announced that Secure Our City, Inc., an electronic security technology and low voltage design firm based in Ashland, Mass., was able to solve the problems that a parking garage used by a leading healthcare organisation was having with standard 125kHz proximity readers and credentials. By creating a new security system featuring cameras, access control and the Farpointe Ranger® long range reading system, Secure Our City was able to make possible higher security access, such as double-tapping at the entrance, and provide the increased control the parking garage needed.

continue on page 72

September / October 2017 • Security Solutions Today

71


APPLICATION STORIES

“To enhance security, the Ranger transmitter-to-receiver long-range, over-the-air protocol takes advantage of a secure, digital anti-playback routine based on a custom enhanced rolling code variant of the Tiny Encryption Algorithm (TEA).”

“We were dealing with high end customers in a challenging neighborhood and a standard proximity system was not doing the job needed,” reports Secure Our City Managing Partner and Founder Geva Barash. “The first thing we did was add cameras, including an analytical camera, to check for piggy-backing. Today, if a vehicle attempts to follow another or a person tries to follow the car in to the garage, a flashing light goes off, warning the driver that they are being followed while acting as a deterrent to the offender. “There were several other things we especially liked about the Ranger solution for this application and its customers, the people that would use it each day,” says Barash.

Versus proximity/smart card readers, the 433 MHz receivers use button transmitters to open gates from ranges up to 200 feet (61 m). Each button outputs transmitter data over separate Wiegand outputs, yet the receiver installs just like a proximity reader for easy integration with popular card access control systems. As a result, the Ranger receivers were a handier solution. Plus, instead of using an active card, which could potentially activate the gate from different directions, the transmitter user selects exactly when the mechanism is to be immediately triggered. “This meant that the users could drive into the garage on a yearround basis without having to open their windows, a definite

benefit in Boston’s rainy springs, warm summers and cold winters,” emphasises Barash. “To avoid the weather, an employee simply presses a button on the Ranger transmitter kept in their car to raise the barrier bar and drive into the garage.” The Ranger system also provides implementation flexibility. It is compatible with Farpointe Pyramid proximity and Delta smart card systems, while supporting standard 26-bit Wiegand as well as custom Wiegand formats plus certain HID® and AWID® 125-kHz proximity protocols. Transmitter coding is sequential, exactly as ordered, with no over or under runs. To enhance security, the Ranger transmitterto-receiver long-range, over-theair protocol takes advantage of a secure, digital anti-playback routine based on a custom enhanced rolling code variant of the Tiny Encryption Algorithm (TEA). The anti-playback feature virtually eliminates the risk of code sniffing and unauthorised cloning. Lastly, Ranger supports MAXSecure, a higher-security handshake, or code, between the transmitter and receiver to help safeguard against credential duplication and ensure that a specific end-user’s receiver will only collect data from these specially coded transmitters. “The parking garage operator likes the entire system, especially how we incorporated long range reading into it,” summarises Barash. “It is keeping the wrong people out and easily letting the right people in. It was very uncomplicated to implement and provided terrific flexibility in programming. For instance, once in, you can’t open it again. That stopped the facility’s former problems with drive-backs. Perhaps, most importantly, the actual users have had no problems. We haven’t had one callback on the system.” For more information, please visit: www.secureourcity.com sst

72

Security Solutions Today • September / October 2017


CASE STUDIES

AllGoVision Secures Gujarat International Finance Tec-City (GIFT City) in Partnership with Honeywell Video Analytics applied on surveillance cameras helps in automating security monitoring for safe and smart cities, making city surveillance more efficient and cost effective. Gujarat International Finance Tec-City or GIFT City, as it is abbreviated, is a classic case of AllGoVision’s smart city solutions Project Requirement Gujarat International Finance Tec-City (GIFT City), country’s first integrated smart city, is being developed as a Global Financial & IT Services Hub. Designed to be at or above par with globally benchmarked financial centres, GIFT City is incorporating best-in-class sustainability features and technologies. In keeping with this vision, GIFT city needed state-of-the-art security and surveillance system to be a truly safe and smart city. And when it comes to sustainability, efficiency and effectiveness – there is a need for automation of security monitoring and smart security alerts.

AllGoVision Solution

The auto PTZ features can take a closer view of anything violating the pre- set rules. Suspicious objects/activities are alerted by left object detection and loitering features.

AllGoVision solution is equally effective for intrusion detection at the outermost layer of the building premises as well as for indoor security monitoring. The tripwire feature gives an alarm on any person or object crossing a virtual line drawn along the boundary of the premise in the camera field of view. Similarly the trespass feature detects entry into a virtual area marked over restricted zones. The auto PTZ features can take a closer view of anything violating the pre- set rules. Suspicious objects/activities are alerted by left object detection and loitering features. The solution is robust to environmental changes like/rain, and reliable due to good object occlusion detection.

Benefits Manually monitoring the video feed for multiple surveillance cameras 24x7 was not an easy task. AllGoVision has automated the process by sending alerts for certain rule violations and security breaches. It has made the surveillance process more efficient as the accuracy of detection is more. At the same time it’s cost effective by saving time and manpower. For more information, please visit: www.allgovision.com sst

September / October 2017 • Security Solutions Today

73


CASE STUDIES

Axis Joins the Queen City’s Guard Cincinnati Police Department embraces smart security technology to improve public safety

190 180 170 160 150 140

Mission

management system.

Cincinnati, Ohio is an historic American city of 300,000 with a highly developed downtown, diverse neighborhoods and over 20 miles of shoreline along the Ohio River. Working with Federal Signal Corporation, a security and safety systems integrator and Axis partner, the Cincinnati Police Department decided to enhance their operations by installing several analog cameras downtown in 2008.

Most of the critical locations did not have a communications backbone, so Federal Signal, a wireless broadband expert, designed and deployed a wireless streaming solution featuring a secured Firetide mesh network and Point-To-Point licensed backhaul utilizing Cambium PTP 810 microwave transmitters for longer distances.

However, in just two years, the CPD decided the analog camera technology was not delivering the image clarity it needed. It decided to retire its analog cameras in favor of more advanced, high-definition network camera technology.

Solution The CPD asked Federal Signal to design and install a new IP-based, citywide surveillance system comprised of nearly 100 Axis high-definition pan/tilt/zoom (PTZ) managed by Genetec Security Center, the unified security platform which includes the Omnicast video

“With strong collaboration among multiple agencies, this solution is serving as a core platform for protecting people in greater Cincinnati area, setting a classic example of interoperability.” - Nirmal Chudgar, Director of Business Development/ Professional Services, Federal Signal

continue on page 75

74

Security Solutions Today • September / October 2017


CASE STUDIES

Result While the Axis cameras are used to help the CPD deter and apprehend criminals, they also play a vital role in public safety. Cameras monitor the downtown business districts, neighborhoods throughout the city and the riverfront to protect the welfare of residents and visitors to the area. They have been used to rescue boaters on the Ohio River, monitor weather conditions on city thoroughfares and help contain hazardous spills.

AXIS Q6034-E and AXIS Q6044-E PTZ Network Cameras for the job. According to Nirmal Chudgar, Director of Business Development/Professional Services for Federal Signal, reliability was a key factor in recommending Axis. “From past experience we knew that Axis technology always worked and technical support would always be there when we needed it,” Chudgar said.

All cameras are managed through Genetec Security Center video management system at a sophisticated operations center at police headquarters. The video travels over the City’s fiber optic network, as well as Building a Comprehensive Video Solution by wireless technology. Firetide mesh nodes Situated on the north bank allowed the City to add Axis of the Ohio River, Cincinnati “Both the technology and the Axis in critical areas is the third largest city in camera images are excellent. Both cameras without wired connections. the state of Ohio. With those that we installed via wireless For longer distances, a police force of 1,000 Cambium Networks’ officers, the Cincinnati network and those that we have Police Department (CPD) installed via fiber optics in the PTP 810 microwave is committed to using places where it was impossible transmitters provided a the best law enforcement reliable high bandwidth tools available to protect to utilise wireless service. We are backhaul for the video residents, businesses and very happy with the choice.” traffic.Highly efficient visitors within the city’s - Susana Gonzalez, Ensenada City H.264 compression 77-square-miles. technology retains HD Secretary of Security and Justice resolution without To provide its officers with overwhelming the mesh additional support, the CPD network’s throughput or consuming excessive data consulted with other departments and citizens’ groups storage. The video is stored for 14 days on a 64 TB to discuss the benefits of installing cameras in the city. Dell Compellent SAN as well as on SD cards inside the Together, they developed a plan and deployed the first cameras for backup. “When an incident occurs, officers analog video cameras in the downtown business district on duty in our Real Time Crime Center (RTCC) can grab in 2008. Two years later, the department was ready to control over the Axis PTZ cameras and zoom in for a expand the coverage into neighborhoods and along the closer look,” said Barry Whitton of the Cincinnati Police riverfront. At that point, they decided a more advanced Department Technology and Systems Section. IP video solution would deliver far better image quality than the original analog technology. The cameras can also be accessed on video walls in the Emergency Operations Center (EOC) and 911 Center Immediate Incident Response during major events.The readily accessible video allows the CPD to quickly assess situations and determine Axis partner Federal Signal recommended high-definition continue on page 76

September / October 2017 • Security Solutions Today

75


CASE STUDIES

the most appropriate response. Whitton recalled one instance where the department received a report alleging a fight involving 20 people armed with guns and knives.“There was a camera right there,” Whitton said. “We were able to see, almost as the incident was being dispatched, that the report was not correct. The crowd was small, and there were no guns and no knives.” In 2013, the CPD added the mobile application from Genetec Security Center to push video out to officers in the field. “This has been an especially valuable tool in covert operations andemergency response situations on the streets and along the Ohio RIver,” Whitton said. In addition, the CPD operates a mobile command van that tows a trailer housing lights and Axis cameras mounted on a boom for events in open fields, parking lots or other temporary locations. Whitton stressed that the department is very conscious of the balance between public safety and individual privacy, and they have strict guidelines on who can operate the cameras and for what purpose.“Everything we do is audited,” Whitton said. “We keep close tabs on who has camera access, and we tightly control who has permission to use them and request archived video.”

Providing Digital Back-Up On the Road and in the Water “Video cameras don’t replace police officers in the field, but they do give them another set of eyes,” Whitton said. Those extra eyes have been particularly valuable in recovering stolen vehicles. When the Real Time Crime Center gets an alert that a stolen car has passed a license plate recognition camera, an RTCC officer takes control of the nearby Axis PTZ cameras, if available, to follow the car as it drives through the city streets.“We had one case where we wanted to make a safe, controlled stop to apprehend the car thieves. We didn’t want them jumping out of the car and fleeing the scene. We watched the vehicle on the Axis camera and radioed the officers near the scene to execute the stop when the car reached the bottom of the hill.” The CPD also uses Axis PTZ cameras to support maritime security efforts along 25 miles of the Ohio River shoreline. They often share the video with the US Coast Guard and other regional maritime first

76

Security Solutions Today • September / October 2017

responders from Ohio, Kentucky and Indiana. In one incidence, an intoxicated man crashed his car on the Kentucky side of the river and tried to flee by swimming to Ohio. “I was able to track him as he swam along the shore and direct the police boat where to fetch him out of the water,” Whitton said.

Sharing the Benefits of Public Safety Cameras Citywide As the system grew, its role evolved from policing crime to enhancing public safety andincreasing the City’s overall quality-of-life. The CPD shares the realtime video with other city departments, including Fire, EMS and Traffic Engineering. The video has been used to support such diverse efforts as directing first responders during medical emergencies and diesel spills, tracking snowfall on major roadways and charting the progress of highway construction projects. In addition, the CPD partnered with a major local university, parks, metropolitan housing authorities and a casino to add cameras along the perimeter of their properties to ensure the safety of those heading to and from those locations. According to Chudgar, “What makes this such a successful public safety tool has been the strong collaboration among everyone involved in this mission critical initiative – our Axis and Genetec technology partners, our wireless broadband vendors, ourselves and the Cincinnati Police Department.” For more information, please visit: www.axis.com sst


CASE STUDIES

INVESTA Office Tower in Sydney CBD Upgrades Their CCTV Solution with Bosch #1 Market Street is a prominent A-grade commercial of office tower, located adjacent to Darling Harbour and a stone’s throw from the vibrant centre of the Sydney CBD. Late last year, Investa’s management decided to upgrade the aging analogue camera system. They chose H3C PLUS to provide the solution.

I

nvesta is a $10 billion plus commercial property owner and manager of over 40 of office buildings nationally, with 17 of these located in the Sydney CBD. With an aging analogue CCTV system at the 1 Market Street of office tower, it was decided to put the project out to tender. After careful consideration H3C PLUS, headed by Nicholas Churchill and Jonathan Hughes, won the project. A number of factors influenced Investa to award the project to H3C PLUS, however the key ones included investment in new cabling and quality all-round cameras that perform well during day and night. H3C PLUS replaced the analog cable to a 12-core multi-mode optic fibre backbone, running from the basement to the roof of the 33-storey building. Three nodes (basement, level 6 and 33) were created with a

rack and UPS at each location. All cameras were cabled via a new Cat-6 cable to the respective node. Three workstation locations were set up for the security room, building manager’s office and the concierge desk at ground level. 33 Bosch 1080p AUTODOME and FLEXIDOME cameras were used across four zones: Building Perimeter, Car Park/Dock, General Lobbies, and Plant Room/Roof. Three AUTODOME IP 5000 HD 1080p PTZs were located at key vantage points near front and back entrances. These outdoor PTZs feature high- speed PTZ control with 30x optical zoom and accurate continue on page 78

September / October 2017 • Security Solutions Today

77


CASE STUDIES

“Objectives derived from the security audit and client’s brief were achieved. We are also pleased with the performance of the Bosch cameras. The image quality is impressive.” - Nicholas Churchill, Senior Project and Account Manager of H3C PLUS

color reproduction in scenes with varying lighting levels, providing identification of people up to 180 m without loss of detail. The remainder of the 30 cameras comprise FLEXIDOME IP 5000 HD (outdoor & indoor versions). These feature 1080p resolution for sharp images, IR option (with 15 m viewing distance) and an auto zoom/ focus lens for quick installation and set up. “We chose Bosch cameras for their performance in different light conditions and the quality images they produce,” advised Nicholas. “Their ONVIF compliance also made them compatible with Geutebrück VMS, the platform specified by Investa. With a bit of tweaking optimal integration was achieved.”

Apart from technical aspects, the aesthetics were also considered. The previous installation left large holes and
facade damage in key places around the building. To rectify
this colour coded plates matching the colour of cameras were used. Jonathan Hughes who worked closely on the project
with Investa from its inception, identified that the facade of the building was of great importance to the owners given the status and location of the building. “The plates covered up previous damage, added to the overall aesthetics of the installation and the owners are pleased with the result,” Jonathan said. “Overall Jonathan and I are very happy with the result delivered for 1 Market Street. Objectives derived continue on page 79

78

Security Solutions Today • September / October 2017


CASE STUDIES

“33 Bosch 1080p AUTODOME and FLEXIDOME cameras were used across four zones: Building Perimeter, Car Park/Dock, General Lobbies, and Plant Room/Roof. Three AUTODOME IP 5000 HD 1080p PTZs were located at key vantage points near front and back entrances. These outdoor PTZs feature high- speed PTZ control with 30x optical zoom and accurate color reproduction in scenes with varying lighting levels, providing identification of people up to 180 m without loss of detail.“ from the security audit and client’s brief were achieved. We are also pleased with the performance of the Bosch cameras. The image quality is impressive,” stated Nicholas Churchill. “Apart from the deployed CCTV solution, Investa management also welcomed the new bre backbone which future proofs the building’s IP communications capabilities.”

the quality of the solution: “We at Investa pride ourselves of being at the fore front of safety and technology; the innovation brought to the table and the seamless installation was a credit to H3C Plus. The H3C Plus team holistically managed the end to end project with the on-site Investa FM team to ensure key critical cut over dates were achieved.”

Investa management team’s comment on the project highlights

For more information, please visit: www.boschsecurity.com.au sst

September / October 2017 • Security Solutions Today

79


CASE STUDIES

Dahua Technology and ASUSTOR Partner to Create Surveillance Solution Dahua Technology announces that over 100 different models of Dahua camera have been integrated into ASUSTOR, providing home and enterprise users with a highly secure surveillance solution.

H

angzhou, China – Dahua Technology, a leading solution provider in the global video surveillance industry, announced today that it has completed an integration with renowned cloud storage and video surveillance brand ASUSTOR. Over 100 Dahua camera models are now verified as being compatible with ASUSTOR’s Surveillance Center, bringing a premium surveillance solution to the market. Now users will be able to create an economical and large scale surveillance system on their trusted ASUSTOR NAS devices. ASUSTOR’s Surveillance Center runs on all ASUSTOR NAS devices and provides 4 free camera channels (more than the industry standard). Users can also expand camera channels according to their needs using purchasable licenses. Surveillance Center features the centralised monitoring software CMS Lite which allows users to centrally manage up to 128 IP cameras in different locations on 32 ASUSTOR NVRs, significantly enhancing management efficiency. The latest Surveillance Center 2.7 beta version advances surveillance functionality and adds a variety of professional functions including: the exporting and importing of camera settings that allows users to save, backup and deploy camera settings to other Surveillance Center installations, support for the new fisheye restoration mode 1O3R and two-way communication on the AiSecure mobile app. “When creating a comprehensive cloud surveillance system, in addition to needing a stable and reliable NAS storage device as a backbone you also need high quality surveillance cameras,” said James Su, Product Manager at ASUSTOR. “We are elated to be partnering with world renowned IP camera brand Dahua Technology in completing compatibility testing and verification for this integration. Now consumers and businesses are able to select from even more popular camera models when creating an economical and comprehensive surveillance solution.” Dahua Technology has one of the most comprehensive line up of surveillance cameras in the industry. The integration with ASUSTOR Surveillance Center offer customers a complete solution to meet the requirement of every site. “Open Integration Innovation has been our guiding principle,” said Daniel Chau, Overseas Marketing Director of Dahua Technology. “We are open to work with platform partners, like ASUSTOR, to form a total solution for customers. We appreciate the value of our relationship and we expect the demand for this Cloud surveillance solution to grow rapidly.” For more information, please visit: www. dahuasecurity.com sst

80

Security Solutions Today • September / October 2017


CASE STUDIES

£4.5 Million New Office Building in East Yorkshire Chooses Ievo Fingerprint Readers

T

he £4.5 million Allam Marine of office building within East Yorkshire has chosen the ievo biometric readers to control the buildings access. This high profile installation, completed by Cobus communications, reflects not only the reassuring reliability of both the ievo ultimateTM and ievo microTM but also their great aesthetics making them the optimum choice for securing an office. As the leading UK manufactured biometric manufacturers, ievo products are highly reliable and easily configurable, which made it an easy decision when deciding which biometric units to use for this client that had requested a bespoke setup. Cobus had used the ievo products in the past for a number of access installations as they have proved highly successful. The Cobus Communications Group said that this particular client had very high standards and wanted a particular look for the door access system along with a specific set of access requirements. The ievo fingerprint readers were connected to a Paxton Net2 Pro system and

configured for a number of different actions depending upon the specific finger offered. This specific system involved a circle lock as Allam Marine required standard access along with secondary opening actions from dedicated readers elsewhere in the building. The system was specifically designed in order to provide the ability to “latch” open the circle lock in the event of corporate open days.

How the Circlelock Access Control Works The member registers their print upon joining the business. This print now acts as the identification method, replacing the traditional identification card. When the member arrives at the offices they simply press their finger onto the reader and this opens the first door of the Circlelock. The Circlelock consists of two sliding doors, which will open one after the other, creating an interlocking security booth. The access-control system is a bi-directional security door allowing entry and exit in turn. continue on page 82

September / October 2017 • Security Solutions Today

81


CASE STUDIES

The bespoke circle lock access system at our Melton site was unique in that it was the first one of its kind in the UK using ievo biometric access solutions. Martin Conley the IT Manager of Allam Marine relayed that their requirements were highly complex however they found a solution from ievo which answered all of their specific requirements. Since the installation, completed by the Cobus Communications Group, they have been extremely satisfied with the installation which has met all their demands and it is outperforming all of initial expectations.

Choosing Biometrics Over Card Readers
 There are several reasons why Allam Marine opted for fingerprint readers over card access control. Problems of card access involve difficultly of tracking cards due to staff losing or swapping cards. Furthermore, the brittle nature of cards often leads to cards breaking causing further problems. Allam Marine wanted a robust reader that would solve these problems but still provide top level security.

“This particular client had very high standards and wanted a particular look for the door access system along with a specific set of access requirements. The ievo fingerprint readers were connected to a Paxton Net2 Pro system and configured for a number of different actions depending upon the specific finger offered.” built in controller/relays. These can be easily removed from the wall and gain entrance by shorting the relay. Allam Marine choose ievo as the ultimate contains no controllers or relays with the matching board housed internally, up to 5 metres away.

The ievo system provides a vandal resistant access control targeting the problem of tracking access within the building as there are no lost cards or staff swapping. This again increases the businesses security. The custom designed lift system adds a further level of security.

“This was the first time we’ve installed the internal ievo micro units and we found them simple to install as well as giving the client the exact low profile look he wanted”, said Vicky O’Grady of Cobus Communications.

Most competitor biometric access control products have

For more information, please visit: www.ievoreader. com sst

Inner Range Secures the Sydney World Tower with Smart Solutions Challenge

Solution

The 75-story prestigious World Tower stands out as one of the crown buildings across the Sydney CBD skyline. With the Australian Prime Minister commemorating the opening, the World Tower is one of the tallest residential apartment buildings in the Southern Hemisphere with a total of 637 apartments. The designers of the building took pride in offering “World Class Security” to the tenants.

The Inner Range Concept 4000 system was chosen as a perfect platform to meet the security demands. With thousands of cardholders, over 100 accessed controlled doors and secure lift control, the Concept system delivers a sophisticated integrated security and access control solution. Tenants use key fobs for wireless entry to the ten car park entries over five levels. The Concept system provides secure lift access

to twelves lifts servicing three separate tiers of the building. Over and above the standard secure lift control, Concept also provides lift ‘button-feedback’ to ensure only a single floor may be selected after each successful card badge; therefore a more robust audit trail is maintained for tracking purposes. Panic buttons located in critical areas, such as car parks, building entries and lift lobbies, are monitored by Concept and in turn linked to the CCTV system. With over 130 cameras monitoring the continue on page 83

82

Security Solutions Today • September / October 2017


CASE STUDIES

building, activation of a panic button ensures camera images are recorded and security personnel are notified.

“The Inner Range Concept 4000 system was chosen as a perfect platform to meet the security demands. With thousands of cardholders, over 100 accessed controlled doors and secure lift control, the Concept system delivers a sophisticated integrated security and access control solution.”

Concept also integrates with the Urmet Domus Digivoice intercom system for lift control; Tenants can easily let visitors onto their floor by pressing a release button on the intercom in their apartment to put the lift in temporary free access for that specific floor. In addition to intruder detection and access control, Concept also provides plant monitoring for the building. Over 50 inputs, including water supply, air-conditioning and pumps are monitored by Concept twenty-four hours a day. Any alarms from plant monitoring are immediately sent to security and building facilities personnel.

Throughout this huge building, Concept undertakes an amazing array of critical functions, both on its own and by integrating with other premium technology platforms – fulfilling the “World Class Security” requirements. For more information, please visit: www.innerrange.com sst

Motorola Solutions Future Concept: Future Fire Command Challenge Motorola Solutions has created a future concept that uses mixed reality, sensors and other devices to keep firefighters and incident commanders connected and safe.

Today, many fire incident commanders rely on manual accountability systems to keep track of which firefighter is assigned to a specific task or zone at the scene. While manual accountability systems help to ensure all personnel stay connected and accounted for during an incident, using them can present challenges. continue on page 84

September / October 2017 • Security Solutions Today

83


CASE STUDIES

“The Mixed Reality Fire Commander concept envisions a future when data about a first responder and his environment are automatically collected “at the edge” or at the incident scene”.

These systems typically comprise a combination of handwritten notes, a whiteboard-style “command board,” and two-way radio communications between the commander and firefighters. Incident commanders often say using manual accountability systems requires them to form a mental image of the scene which can pose difficulties. Firefighters responsible for putting out the fire must proactively communicate their activities to commanders – even in high-stress and life-threatening situations. They have to clearly articulate their location, monitor and share their physical status and describe what they see. The incident commander continuously tracks and updates the location of his team, both on the command board and in his mind. He has to assess large volumes of verbal, visual and written information and share it with personnel at the scene to help them make the right decisions. In high pressure situations this creates room for error.

Solution The Mixed Reality Fire Commander concept envisions a future when data about a first responder and his environment are automatically collected “at the edge” or at the incident scene. Presenting this information in a mixed reality format enables an incident commander to visualise data in simpler, more intuitive ways so faster decisions can be made. It includes: • Mixed reality technology that enables incident commanders to visualise data in cutting-edge ways. • Sensors and devices worn by firefighters that automatically record and share data including air supply, biometrics (heart rate, breathing), environmental temperature, and “point-of-view” (POV) body worn cameras that capture the firefighter’s surroundings. • 360-degree cameras providing alternate views of the incident at the scene, on vehicles including police cars and on aerial drones.

84

Security Solutions Today • September / October 2017

Mixed Reality Mixed reality technology transforms the experience of the incident commander. For example, a mixed reality headset can enable him to view and interact with a 3D hologram of a burning building that shows floor plans, the location of each firefighter, “hot spots” and other important information. Having a more complete picture of the scene helps to relieve mental pressure on the commander, freeing him up to focus on other tasks. The demonstration closes with a true, advanced mixed reality experience in which the incident commander uses a mixed reality headset to see the building’s structural layout, the location of personnel inside, their status and progress of the fire - simply by looking at the building from his nearby command post. This concept uses Microsoft’s Hololens, “smart glasses” fitted with a holographic computer, enabling users to interact and engage with digital information and holograms in the world around them including graphics and video. In this concept, mixed reality and hologram technology enables more natural interaction with information, including the ability to select, open and move holograms using gaze, simple gestures such as swiping and voice commands. It also gives the commander a much richer picture of the incident that helps to overcome the often chaotic, noisy and difficult to see environment at the scene. This scenario was constructed for a commander managing a team of firefighters, but the concept could also be applied in a military setting, during an incident at an oil refinery or in any industrial environment requiring data visualisation, assessment and decision-making. For more information, please visit: motorolasolutions. com sst


CASE STUDIES

OT Systems Ethernet-Over-Coax Solution Takes the Grand Indonesia CCTV System From Analog to IP The Grand Indonesia’s shopping malls and business office centers recently modernised it’s CCTV system taking it’s surveillance capabilities from analog to IP by integrating OT Systems’ Ethernet-over-Coax (EoC) transmission solution to existing infrastructure.

T

he Grand Indonesia is a multifunctional complex in Jakarta, consisting of the Grand Indonesia Shopping Mall, BCA Tower, Kempinski Private Residences and Hotel Indonesia and covering an area of 640,000 m2 (6,900,000 sq. ft.). It is one of the largest shopping centers in South East Asia. The multi-use complex opened in 2006 with a traditional analog surveillance system. After a decade it was time to upgrade to an IP-based system to provide better image quality and advanced video management and integration. OT Systems’ comprehensive and reliable EtherXtra™ Ethernet-over-coax (EoC) solution fulfilled the need to support the existing analog systems while upgrading to IP networks in an easy and affordable way.

PTZ cameras. The power supply can be connected with one-channel or multi-channel receivers like the ET1100CPp-R and ET42000CPp-RS8/16 which supply power using legacy cable. OT Systems’ wide range of EtherXtra™ EoC product series allows users to utilise the existing coax infrastructure to migrate to IP-based systems. This cost-effective EoC solution breaks Ethernet transmission distance and easily upgrades CCTV systems to IP surveillance networks. It offers long range transmission allowing 1 km to be reached via coaxial cable. It saves considerable expensive by eliminating installation of new Ethernet or fiber cables. Additionally, its plug-and-play design allows for easy installation without the need for extra infrastructure.

A total of 100 singleTo enhance the safety and channel ET1100CPp-T security, more customers “OT Systems’ comprehensive transmitters were are considering updating installed to connect 100 existing systems to and reliable EtherXtra™ EthernetIP cameras and connected IP requirements. OT over-coax (EoC) solution fulfilled to either single-channel Systems is an industrythe need to support the existing ET1100CPp-R receivers or 8 leading supplier focused to 16-channel ET4200CPpon Ethernet-over-coax analog systems while upgrading RS8/16 rack-mount transmission solutions. to IP networks in an easy and receivers. The ET4200CPpaffordable way.” Our EoC product series RS8/16 receiver offers offers an unparalleled full switching capability and 10/100/1000Mbps and innovative solution for system integrators, installers and end-users. This auto-MDI/MDIX full-duplex communication and it’s available with rack-mounting installation in the 19EoC retrofit easily repurposes existing coaxial cable infrastructure, enhances the system with centralised inch rack cabinet. The EoC solution provides flexible communications and 30watt high power with power power and creates a feature-rich IP surveillance systems. sst over coax (PoC) technology to remote PoE IP cameras or

September / October 2017 • Security Solutions Today

85


CASE STUDIES

Loveland, Colorado, Implements Citywide Surveillance Network with Panasonic Challenge The shortcomings of an aging analog video surveillance system at the city of Loveland art gallery was highlighted by an act of vandalism. This incident kick-started the implementation of a standardised, citywide networked solution.

Solution The city of Loveland rolled out a comprehensive surveillance solution built on a foundation of i-PRO network surveillance cameras, recorders and ASM 200 video management software.

Result The city of Loveland Museum/ Gallery, Traffic, Parks - Recreation, Police, Courts, and other departments and facilities now have a fully integrated citywide surveillance solution that is easy to use and can be centrally managed by each department. The city of Loveland, Colorado, decided Panasonic full HD 1080p and HD 720p cameras, recorders and ASM200 management software could help them achieve their overall goals of comprehensive security, centralised management, cross-department accessibility and the ability to easily add to and upgrade the video infrastructure to meet future needs. “It [the new integrated video surveillance solution] allows each department to accomplish their own video surveillance goals, based on their individual needs. We needed a standardised system that we could

easily maintain and be able to turn over management of the video to the user. If the video belongs to a certain department they should be able to manage it,” said John Ham, Systems Administrator in the City’s IT Department. The city of Loveland has access to a 10Gb fiber optic network backbone connecting some 20 different facilities. The infrastructure was able to easily support Panasonic’s distributed processing system and

quad streaming technology, making it the perfect solution for video as it enables high resolution 720P/1080P performance and recording. The system continues to lessen the pain points of integrating, expanding and upgrading older technology, according to Tad Reid of Open Door, Inc., a Panasonic representative. “The Panasonic System is able to grow over time because of its backwards compatibility. Processing speed and performance is always improving as the system grows.”

“The system continues to lessen the pain points of integrating, expanding and upgrading older technology. The Panasonic System is able to grow over time because of its backwards compatibility. Processing speed and performance is always improving as the system grows.” - Tad Reid of Panasonic Representative Open Door Inc

continue on page 87

86

Security Solutions Today • September / October 2017


CASE STUDIES

Evolution of the Upgrade to New Capabilities An isolated incident of vandalism in the city of Loveland art gallery helped trigger a comprehensive citywide upgrade in surveillance solutions. Although there was an existing installation of analog cameras at the gallery site, the aging equipment was failing and not producing the quality of surveillance video needed. “After that incident we started to look closely at implementing a standardized, citywide solution that could be used at the museum and other facilities simultaneously,” said Ham. “One key criteria of our new system was that we needed to be able to individually manage the video by department,” said Ham. “The Traffic Department needed to be able to manage their cameras and video feeds and access footage, as well as the Parks and Recreation and Police Departments.” The Loveland Traffic Division had been a long-time user of Panasonic cameras, but their VMS system was aging and not capable of integration with the newer software solutions being implemented. The VMS system was not Panasonic, but provided by the Colorado Department of Transportation; and, while it supported Panasonic analog PTZ cameras at traffic intersections and hot spots, there was no available local support, making it cumbersome to add IP cameras and download updated software “The change to Panasonic ASM-200 software and Panasonic IP cameras for Traffic has made it easier for Traffic Department staff to manage our Operations Center video display array and monitor intersections across the city,” said Bill Hange City Traffic Engineer.

Law and Order Fully Integrated for Greater Safety The Police and Courts building had an aging system, with no backup or RAID storage and they were looking to replace

“The new integrated video surveillance solution] allows each department to accomplish their own video surveillance goals, based on their individual needs. We needed a standardised system that we could easily maintain and be able to turn over management of the video to the user. If the video belongs to a certain department they should be able to manage it,” - John Ham, Systems Administrator of City IT Department

that. The police system now consists of 42 cameras [WVSFV631L WV-SW158, WV-SF336, WV-SF438, WV-SC385, WV-SW538] providing internal and external coverage, including garage bays, prisoner transport areas, entrance ways and courtrooms. The Police Department uses three WJ-NV200 network disk recorders to record 24/7 on motion/exception at night and full motion during the day. To best leverage the broad surveillance deployment the city also provides the police department access to the Traffic Division’s cameras to provide a realtime view of the city. To achieve this, Loveland utilizes the i-PRO WV-ASM200 video management software to allow the unification of large, multirecorder, multi-site networked video systems. The city also integrated analog cameras in the Justice Center, Larimer County courtrooms with the WJGXE500 IP encoders, the latest Panasonic technology. Demonstrating Panasonic’s dedication to backward compatibility, the encoders integrated seamlessly with cameras installed some five years ago – protecting the County’s existing technology investment while allowing them to take advantage of the latest video technology. The city of Loveland continues to expand its surveillance solution to provide a safe and secure environment for both residents and the thousands of visitors who attend annual events and participate in other community activities throughout the year. The department upgraded to Panasonic WV-SW396A network cameras and WVASM200 software. For more information, please visit: www.business. panasonic.com sst

September / October 2017 • Security Solutions Today

87


CASE STUDIES

Security Integrator Finds HighPerformance, High-Density Video Upgrade Solution for Eastland Shopping Center

W

hen a leading security integrator tried to help Eastland shopping center upgrade its video surveillance system, they were quickly overwhelmed by the massive amount of data being captured, analysed, and stored. The answer turned out to be a combination of open-platform solutions from Axis Communications, Milestone Systems, and Quantum. The new system provides the coverage the customer needs, supports enhanced analytics and fits neatly into the shopping center’s existing data center, all while meeting tight budget constraints. Australian security integrator PMT Security Systems was faced with a difficult problem for one of its customers, a large shopping center undergoing major renovation and refurbishment of everything from décor to video surveillance systems.

The company that managed Eastland Shopping Center wanted to upgrade to the latest stateof-the-art video monitoring and analytics systems, but was having trouble finding a solution that would fit Eastland’s budget and the space in its data center.

The old system used a combination of roughly 300 analog and lowresolution digital cameras and kept the data for two weeks. It was used primarily for monitoring current activity in the major public areas, so the network, storage systems and data center were all designed with

“StorNext 5 software includes a highperformance file system specifically designed for video applications, so it writes data over many parallel streams for maximum performance” - Daniel McMahon, Project manager of PMT

continue on page 89

88

Security Solutions Today • September / October 2017


CASE STUDIES

that load in mind but the customer wanted to make the new system perform on an entirely different level. “They wanted to cover more areas and have much higher-resolution images to make identification of activities and individuals much more specific and reliable,” explains Darren Taylor, managing director at PMT Security Systems. “They wanted to roll out newer technology with the capability of turning security images into a tool for making better business decisions for Eastland and its tenants.

Expanded Capabilities Create Crisis for Existing Data Center To provide more coverage, more cameras would be needed—about 600 to start. The new system needed to provide higher-resolution images, and the data needed to be retained for a much longer period of time—a full 90 days. The software had to provide additional levels of recognition, tracking, and analysis. The new solution also had to fit the customer’s budget, and the space in their existing data center. The extra resolution, additional cameras, and longer retention were essential to giving the analytics software the data to provide an additional layer of business intelligence,” explains Daniel McMahon, project manager at PMT. “Video analytics have come a long,

“ The security industry is undergoing a real transition—moving from small, lowerres appliances to much higher valueadded solutions that integrate powerful specialised storage technology. StorNext helped make that transition easy for our customers and for us.” - Daniel McMahon, Project manager of PMT long way in the last few years. The best give good approximations of demographics for people visiting the location, including age and gender, and overlay that data with behavior patterns, so businesses can see where customers stop—at what displays or stores they spend the most time. It’s a potentially powerful tool for helping retailers do a better job of serving their customers, but it takes a lot of data to make it work. It meant upgrading from relatively simple video appliances to a fullblown enterprise-scale network and storage system.”

“We looked at solutions from literally everybody in the storage and surveillance market,” adds Jack Caponnetto, operations manager at PMT. “We eventually found a solution set combining technology from several different vendors that solved all the problems neatly and worked together seamlessly.”

The Axis, Milestone, Quantum Solution PMT came to Anixter, the leading global provider of security products, seeking a solution that met the performance and site requirements of Eastland Shopping Center: a high-resolution, scalable solution that would meet the growth required as Eastland completed phase 1 of redevelopment and continually added cameras through phase 2 and 3 in the coming years. This solution was the combination of Axis Communications cameras, Milestone VMS, and Quantum storage. “Axis provides premium IP cameras with the range of resolutions that we needed for different applications,” Caponnetto notes. “They offer pan, tilt, and zoom, protected dome mounting for areas needing that feature, and they do an incredible job of pinpoint autofocusing— even in really challenging light conditions.” The team chose Milestone Systems for video management software (VMS), and RetailNext for business analytics software. “Milestone is really the best choice we found for managing the network and all the pieces, and making sure that everything came together,” says project manager McMahon. “RetailNext gives end

September / October 2017 • Security Solutions Today

89


CASE STUDIES

users what is probably the most advanced set of point-of-sale, bigdata analytics on the market. Both Milestone and RetailNext work together via open architecture APIs to provide maximum flexibility and value over time.”

easy to install and maintain. And its StorNext 5 software includes a high-performance file system specifically designed for video applications, so it writes data over many parallel streams for maximum performance.”

Storage Requirements Threaten to Swamp Existing Data Center

The QXS disk, besides providing cost-effective capacity, works with StorNext to provide very highstreaming performance, industryleading density and easy data retrieval through the VMS—all features that are critical in many security applications.

All of the data from the cameras, however, substantially increased storage requirements. “We could see immediately that we were going to have a full 600TB of data when the system rolled out. That it would increase over time when we added more cameras to more areas of the shopping center,” says Taylor. “And the data needed to be able to be streamed to the disk at an incredibly high rate.”Surveillance systems have unusual storage requirements that can be particularly challenging. “Data is ingested around the clock from many different sources at the same time, so a system needs to have very high input performance,” explains Simon Vagg, systems engineer at PMT Security Systems. “But once the data is set, it has unusually low I/O requirements.” Files are written off to portable storage if a file is needed for an investigation, and the analytics software moves metadata to separate servers. Neither of those activities put a heavy I/O load on the disk. The team looked at storage products designed for generalpurpose IT environments, but discovered they would be expensive and more complex, which would lengthen the project timeline and delay the rollout of more cameras and features.

Stornext Solutions Store A Petabyte in Eight Rack Units “The very best solution that we found for the storage side of our solutions was Quantum’s StorNext software and QXS-5600 disk,” says McMahon. “The StorNext M440 appliance is

90

“With the StorNext solution, we were able to design a system that packed a full petabyte of capacity into only eight rack units. It gave us a combination of cost savings and simplified installation that let us pull the schedule in and give our customer more of what they wanted much faster,” says Caponnetto. “We couldn’t find any other storage solution that even came close. It was the key to making the new system work for the upgrade.” In the new system, data is streamed from the 600 Axis IP cameras to the QXS-5600 storage through the StorNext software under the control of the Milestone VMS solution. Data is written from the disk to the RetailNext server for analysis and to portable storage when files have to be retained or viewed in a third-party security setting. “We

“We like the fact that StorNext gives us the option of integrating a very high-capacity, very low-cost tape archive to handle all that data.” - Daniel McMahon, Project manager of PMT

Security Solutions Today • September / October 2017

have implemented the system. It is up and running, and it has been flawless,” says Taylor.

Collaborative Approach Delivers Performance, Reliability and Value Just as important to PMT and the customer as the individual pieces of the solution is the fact that all the pieces work together easily in an open architecture, the companies’ support teams can collaborate effectively, and additional storage can be added easily as more data is created. “As we add more cameras and higher-resolution formats, we can see a future need for even more capacity,” says McMahon. “We like the fact that StorNext gives us the option of integrating a very highcapacity, very low-cost tape archive to handle all that data. “The security industry is undergoing a real transition—moving from small, lower-res appliances to much higher value- added solutions that integrate powerful specialised storage technology. StorNext helped make that transition easy for our customers—and for us.” “There are lots of people that say they can work well with others, but it really is true for Axis, Milestone, and Quantum—the three key foundations of this solution,” says McMahon. “We had cooperation from all the partners during the whole process. Once the system was up and running, it took almost no admin time at all—that is incredibly important for retail settings, which typically have limited IT resources. We have been so happy with this solution that we have already proposed it to several more customers. We plan to make it the standard solution that we recommend.” For more information, please visit: www.quantum.com sst


CASE STUDIES

Rouse Hill Anglican College Goes Keyless

R

ouse Hill Anglican College is an independent Christian school located in Rouse Hill, in Sydney’s expanding northwest. It is an Anglican co-educational school for students from Kindergarten to Year Twelve. The College was using mechanical keys to control access into different buildings and classrooms but if keys were lost that meant the expense of cutting new keys and sometimes having to replace the lock as well. To eliminate the necessity and cost of this, it was decided to upgrade security to a keyless electronic access control solution. John Binney, Property Manager at Rouse Hill Anglican College says “Having kept up to date with changes in the security world, I knew that migrating from a mechanical key system to electronic access control could give us a virtually ‘keyless’ property that would be secure, and easier to operate and manage. “We looked at several systems that could do the job but after a presentation by local security specialists, Independent Locksmiths and Security, we could see SALTO was a great solution and were happy to go with their recommendation of it” Binney said.

“A demonstration of SALTO’s ability to control access, download audit trail information in real time, delete users remotely and securely, lock and unlock doors remotely and collect lock battery status for maintenance sealed the deal. We have now installed 120 SALTO XS4 offline electronic handle sets together with a small number of CU50ENSVN (SALTO Virtual Network) controllers in the administration area as well as into classrooms and offices throughout the College.”

Ryan McGovern, General Manager at Independent Locksmiths and Security comments “When we explained to the College how SALTO Australia has an established base of School and College customers to whom they provide security, access control and campus management they wanted to know more.

“A demonstration of SALTO’s ability to control access, download audit trail information in real time, delete users remotely and securely, lock and unlock doors remotely and collect lock battery status for maintenance sealed the deal. We have now installed 120 SALTO XS4 - John Binney, Property Manager at Rouse Hill offline electronic handle sets together Anglican College with a small number of CU50ENSVN (SALTO Virtual Network) controllers in the administration area as well as into classrooms and offices throughout the College.” John Binney concludes “Our new SALTO access control system provides us with good effective security. We particularly like its SVN operating system and the fact that the RFID cards give us multi-application capability for as and when we want to use it.” For more information, please visit www.saltosystems.com sst

September / October 2017 • Security Solutions Today

91


CASE STUDIES

Torp Sandefjord Enhances Airport Security with Smart Thermal Cameras

A

irport security has been greatly enhanced for Torp Sandefjord Airport, Norway through the deployment of SightLogix smart thermal intrusion detection cameras. Installed in 2014, the solution has been providing long-range, automated protection over key areas of the airport. As a popular alternative to Oslo Airport, Torp Sandefjord serves approx 1.5 million passengers a year traveling to Western Europe as well as emerging economies in Eastern Europe, where risks from cargo theft, avionics theft, and controlled substance smuggling require constant vigilance. Additionally, high-profile incidents at airports around the world made it clear to Sandefjord’s directors that they needed to strengthen their airport security posture.

Solving Airport Security Challenges with Technology Before SightLogix, Sandefjord had been relying on a combination of perimeter fences, surveillance cameras and roving guards to protect the site. Looking for a more effective solution, the airport turned to SightLogix Certified Integrator Focus Security, a Norwegian security firm dedicated to solving security challenges for critical assets

“SightSensors also support built-in electronic stabilisation to ensure a high probability of detection without false alerts caused by wind or airport vibrations and they are capable of detecting intruders over long and wide distances, up to 600 meters away, allowing a single camera to cover the same area that would require many visible light cameras.” continue on page 93

92

Security Solutions Today • September / October 2017


CASE STUDIES

throughout northern Europe. They suggested the airport move from a passive security posture to a pre-emptive automated approach using SightLogix SightSensors. SightSensors are thermal cameras with integrated video analytics, automatically detecting intruders over large outdoor sites with high accuracy and low costs. SightSensors offer several capabilities that make them an excellent choice for the difficult job of protecting airport perimeters. As thermal devices, they detect intruders in complete darkness as well as glare conditions caused by the rising or setting sun, headlights, reflected light and other sources. SightSensors also support built-in electronic stabilisation to ensure a high probability of detection without false alerts caused by wind or airport vibrations and they are capable of detecting intruders over long and wide distances, up to 600 meters away, allowing a single camera to cover the same area that would require many visible light cameras. This enables Torp Sandefjord Airport to take advantage of significant cost savings while ensuring accurate and reliable intruder detection.

The Airport Security System at Torp With the smart thermal solution in place, intruders that violate rules trigger an alarm, sending video of the event and the target’s precise GPS location to the airport’s Security Operations Center, where security

personnel monitor and verify the threat in real time. The target’s location is simultaneously projected onto a sitemap of the airport for situational awareness. The result is a blanket of automated awareness around all of the critical areas of the expansive airport. “The SightLogix system has taken Sandefjord Airport to the forefront of land-based security technology at airports,” said Ellen Sandnes of Torp Sandefjord Airport. “We offer a safe and enjoyable travel experience to our customers.” By enhancing the airport’s security with, round the clock intruder detection, the airport realised great cost savings by leveraging existing personnel much more effectively. Instead of hiring additional guards, which in that part of Europe can cost up to $25,000 per month, the existing force has been empowered with instant notification about the nature and location of a security breach day and night, and can initiate a fast and direct response. “Achieving security awareness at airports is a global challenge for the transportation industry,” said John Romanowich, SightLogix president and CEO. “We are pleased that SightLogix solutions are helping solve these challenges for Torp Sandefjord Airport.” For more information, please visit: www.sightlogix. com sst

September / October 2017 • Security Solutions Today

93


SECURING SMART CITIES | PUBLIC SAFETY IN THE SMART SOCIETY

hand, e n i s e tphon worldwid r a m S “ llion to Forrester, aising i b a r ove 6, according e are reorgannd in 2e0t 1research firomm, wmunities ar.”ou

mark s and our c ions.13 e unicat v i m l , r m u o o ig Data obile c ities: B pia C t r a mass m m ew Uto send, S . Town Quest for a N M y n o e - Anth ckers and th a Civic H

“Several technolo cities have adop ted smar gies, applyin accelerate t g arti their

fi transitio smart wa n into th cial intelligence te to e future. million a r meter technolo In Barce gy helped nnually. lo n a, In the city s operatin South Ko av gc rea, one city cut b e $58 to regula osts by 30% after uilding te impleme n IoT footp water and electr icity usa ting smart senso rint expe ge. With rs cted to s devices b the ur y 2020, u rban com pass 50 billion co global strength nnected munities en w recovery existing cyberse curity pr ill need to methods otocols a to opportun nd disaste ities to w counter hackers r searchin reak hav g for oc.” - Todd Th ibodeaux from The Harvard B usiness Re view

Securing Smart rent things to e iff d ly t h g li s use digital rt city” means agrees on is that smart citiesdu a l m s “ a e il environmenta h “W them, re ce g everyone in in e th e liv st on ho , fir w e le le t peop the quality of life of the peop ther thing is that a safe city is th differen oothly. Ano es to improve technologi services run sm ake everyday impact and m smart city.” step toward a ications

- Axis Commun

igital d s e s u rt city mprove the liversshoifp a m s “A gy toesi strategic leadmeising o l o n h ro tec his requir ighly p logy no .T n. H people ministratio mbrace tech d e e a by the ties not only o nourish th s i l c a t smar on but izens.” novati and in y of their cit it creativ lin or, Ber y Advis c li o P , er - Tunc

“Setting up a standards for national environment ensics framework and all-source analysis to intelli

study the expl ge oitation of biom nce enabled intelli etricsgence is essent ial, infused w culture of secu ith a rity, the polic y will promot social well-be e stability, ing and wealt h creation.” - Dr. Amiruddin Wahab, Chief Ex ecutive Officer, Cybersecurity M alaysia, Ministry of Science, Tech Innovation nology and

“Sometimes there are no proper mechanisms updates], where companies can just produce a security fix and get [for

it quickly installed on the systems and devices, this is a really big challenge because if they find a security issue, that should be solved very fast. If not, then they remain open to attacks.” - Cesar Cerrudo, Chief Technology Officer at securi

ty research firm IOActive Labs

94

Security Solutions Today • September / October 2017


PUBLIC SAFETY IN THE SMART SOCIETY | SECURING SMART CITIES

“Security p

ractitioners

should be p

to create a set of servic es around n have effecti etwork con ve controls nectivity, ap .” pliances an d data analyt - Pravin Srin ics to ivasan, Head of Security, In dia and SAAR C at Cisco Sy stems

art of an ec

osystem

to combine cial media y it n u t r o p p o meras, so “It’s an surveillance ca o de vi able a higher om fr information security frameworks, which en n and ors, and cident detectio and other sens automated in n, io ct te de nt rate of incide fety.” se for richer sa on sp re r ke ic qu Cisco Systems and SAARC at a di In , ty ri cu an, Head of Se - Pravin Srinivas

Cities of the Future • Ukrainian po ever malwarewer station, the first -driven power reported and left thousand outage s of househol for a few hour ds w

s.

ithout power

San Francisco Municipal Tra nsport Agenc a ransomware y experienced attack that sa w the light ra offline and aff il transit goin ecting commut g ers during the weekends of th busiest shoppi e year. ng • Washington DC’s surveilla nce camera br attack that in each, a ransom fected police ware surveillance ca days before th meras eight e inauguration of widespread in stallation effor President Trump, forcing ts to regain ba raises alarms ck access. Thi on the vulner s ability of the that could have surveillance sy been much wor stem by ransomwar se if it was no t infected e but hackers with a fixed ag important fig enda tracing ures. - Mr David Siah , Country Manag er of Trend Mic examples of Cyb ro Singapore gi erattacks on Sm ves art Cities

l t of evi ’ e n r e t “’In CISOs s i ’ s g thin ghtmare, Pawin next ntio a report fromcent of

g r referrin hat says 83 pe in their rs st e s t e r in p r x E fault have p s ie with de n , a n io t a comp r configu rypted default s, and unenc inside rd te passwo this is the sta t will be ha If w i. , F s in art W ratio o p r o ithin sm c w r e jo p a a c m s ds ven les eat lan the thr ere there is e h cities, w overnance?” g y it y r u c se , Ministr h, CISO e m r a h AlMa - Bassam of Jordan, e c of Defen

plan, plan and then nizations , n la “p , ys sa at th e ment orga “There is an old adag state and local officials, urban planning and devey. lop time spent to get e Th s, ician of the smart cit ion vis e th o int ity execute. I urckge, coallllapobolitrat ur g to compensate for e and design sec e future by not havin

m the cant sums in th to take a step ba been designed in fro save taxpayers signifi ll wi te ga e th s when it could have of t ram ou og pr d it right an s gie olo with people, techn security issues later start.” cer of Tenable and Chief Operating Offi t den esi Pr rd ffa Hu k - Jac

September / October 2017 • Security Solutions Today

95


SECURITY FEATURE

USING AI AND VIDEO ANALYTICS TO MAKE CITIES SAFER

T

oday’s municipal authorities are placing extra emphasis on providing a safe environment for their citizens, on the understanding that this is a basic requirement to help their cities prosper. A range of efforts are required to attain this goal, including an increased budget for police and other first responders, and the investment in various technologies that can assist in detecting, preventing, and managing safety and security threats. As part of this effort, and recognising that video surveillance is key to helping achieve this goal, a high percentage of cities

96

around the world have deployed surveillance cameras in the streets and in government buildings. In a given city, the number of these cameras can range from a few dozen to hundreds of thousands, and while they all record the city’s happenings, precious few of them are actually monitored, due to lack of human resources. The main benefits provided by these cameras is the collecting of evidence for debriefing or investigation, as well as the ability to view events remotely in real-time, presuming that operators know which cameras to look at, and when. Sadly, the truth is that the majority of cameras deployed in cities provide little value, most of the time.

Security Solutions Today • September / October 2017

FF By Zvika Ashani, CTO and Co-Founder of Agent Video Intelligence (Agent Vi)


SECURITY FEATURE

The huge leaps forward that have been made in the past few years in Artificial Intelligence (AI) and Intelligent Video Analysis (IVA) are beginning to impact the market. The idea is actually very simple: a computer never gets tired, bored or distracted, and can continuously monitor a camera without pause.

Yet, imagine a hypothetical situation where each camera is watched continuously by someone, who never gets tired or distracted, and who also becomes extremely familiar with the camera that they are monitoring. For example, they immediately understand that a line forming in front of an ATM at lunchtime is nothing special, but that three people standing near that same ATM at one o’clock in the morning looks highly suspicious, and should be reported. Over time, this hypothetical person would develop a comprehensive understanding of what constitutes accepted behavior for people and vehicles, at any point throughout the day, on every day of the week. As a result, this person would be able to intuitively identify events that require attention, and potentially also a real-time response. Naturally, this scenario cannot feasibly be implemented, even in countries with very low wages, since multiple personnel would be needed for constant 24x7 monitoring of each camera. Unfortunately,

therefore, the best-case scenario is that certain cameras in key locations are monitored continuously, while the rest simply consume electricity. All this is about to change. The huge leaps forward that have been made in the past few years in Artificial Intelligence (AI) and Intelligent Video Analysis (IVA) are beginning to impact the market. The idea is actually very simple: a computer never gets tired, bored or distracted, and can continuously monitor a camera without pause. While this is arguably nothing new from a technological standpoint, multiple barriers have prevented this kind of solution from being deployed thus far. These can be summarised as follows:

Lack of understanding How to cause a computer to accurately recognise the different objects in a video stream is a very well researched topic, yet until now the quality of the results (particularly in a busy urban environment) has been somewhat

underwhelming. For this solution to work well, the software needs to be able to differentiate between a person, a car, a motorcycle, a static object, a dog and so on, and under various circumstances: during the day, at night, and under year-round weather conditions. The technology required for this to be executed at an acceptable level of accuracy has only recently matured, and is known as Deep Learning. Deep Learning has several uses, but one of its most exciting applications is the ability to accurately detect and classify objects both in still images and in video. This technology is fast becoming the basic building block for IVA.

Inability to learn The ability to detect and classify objects is an important step, but it is certainly not enough. Within an urban setting, there could be multiple objects moving in the field of view of a camera at any given time, yet it is highly unlikely that we would need to be alerted to each of them. Traditionally, IVA

September / October 2017 • Security Solutions Today

97


SECURITY FEATURE

The rapid increase in GPU computational capacity, coupled with mass market adoption, has reduced prices to the point where a single server, with the correct implementation, can handle hundreds of cameras, which makes large-scale deployment a feasible option.

applications have relied on a rulebased approach, meaning that for each camera monitored, someone needs to configure the software and specify the types of events that generate an alert. For example, a crowd of people standing on a certain street corner after nine o’clock at night, or a vehicle parked in front of a fire hydrant any time during the day, should both trigger alerts. While a rule-based approach can be effective in some scenarios, it cannot be practically applied in a setting with hundreds or hundreds of thousands of cameras, because of the prohibitive amount of manual labor required to configure and maintain these rules, as well as the fact that in most cases, one would not know which rules to set for each camera. There needs to be a different solution for this problem, one which requires minimal (if any) input from a human operator. This is where AI (or as it is better known in technological circles, Machine Learning) comes into play. An AI solution can gather data about all the people and vehicles observed by each camera over extended periods of time (including days, weeks and even months). Machine Learning techniques can then be applied to this data, to generate models for what can be regarded as “normally observed” behavior. These models can then be applied in real-time to check whether certain behaviors observed by each camera either fit the normal pattern, or deviate from it – in which case they should be flagged as suspicious events that

98

require review by a human operator. This technique allows the solution to scale to any quantity of cameras, without placing a burden on the users to configure each new device.

Cost There is no simple ROI model that can be applied to increasing safety and security, which can then be measured in terms of financial gain. The result of this is that budgets will always be constrained, and the cost per camera needs to be low enough so that the decision to deploy this across thousands of cameras does not become unworkable. Until recently, implementing real-time AI was extremely cost-prohibitive, and could require an entire server per camera. The rapid increase in GPU computational capacity, coupled with mass market adoption, has reduced prices to the point where a single server, with the correct implementation, can handle hundreds of cameras, which makes large-scale deployment a feasible option. The convergence of Deep Learning for video analysis, advances in AI for fully automated event detection, plus the significant reduction in cost to implement these techniques, means that the fully automated video surveillance solution for cities is becoming a reality. We expect to start seeing this type of solution being deployed over the coming months, and to become the de facto standard during the next couple of years, for any smart city deployment. sst

Security Solutions Today • September / October 2017


SECURITY FEATURE

Digital ID BIOMETRICS ARE THE KEY TO MARRYING SECURITY AND CONVENIENCE Only biometrics can unify the age-old opposing forces of user-experience and digital security, says Isabelle Moeller, Chief Executive, Biometrics Institute. When it happens, the effect will be remarkable.

T

hanks, in no small part, to the whims of Hollywood, biometrics have become something of a go-to metaphor for bleeding edge, bulletproof security. It’s easy to see why: iris scanners make great TV. Sadly, reality is always different to the big screen. The last five years have lifted biometrics out of Mission Impossible and dropped them into the lives of everyday consumers, where they are fast assuming a central role in digital identity management. Popular engagement with voice recognition in telephone banking and smartphone fingerprint scans, are, thankfully, sobering perceptions. Security breaches, while unfortunate, have underlined that biometrics are far from infallible and most certainly are not an ‘overnight solution’ to the world’s digital ID problems. Neither are they toothless, however. On the contrary in the right hands biometrics, like chili peppers, can be powerful ingredients that give real punch to the security mix. What’s more, in the world of digital identity, particularly in user authentication, there is an urgent need to spice things up; the industry faces serious challenges. The recent proliferation of digital services and cloudbased platforms, each requiring independent user verification, is making mincemeat of the username and password (UNP) model. Ubiquity compels even the diligent to reuse at least some of their UNP credentials, dramatically increasing the security implications of a hack. Indeed, many of the most popular cloud-based

FF By: Isabelle Moeller, Chief Executive of The Biometrics Institute

September / October 2017 • Security Solutions Today

99


SECURITY FEATURE

The identifying power of these behavioural factors can be harnessed by multifactor authentication solutions and, when combined with conventional biometric data, can be used to continually and automatically confirm and reconfirm the user’s identity without interrupting their user experience with off-putting ID challenges.

services already automate this practice, enabling users to apply their ‘unique’ UNP to a variety of other accounts (a process known as single sign-in, or social login). The risk posed by this kind of identity federation is obvious: a hacker needs only to crack one UNP to gain access to all the user’s associated accounts. Various services exist to help mitigate UNP vulnerability (password ‘vaults’ and management applications) but few would disagree that these are at best sticking plaster solutions; the days of UNPs are numbered. Two-factor or multifactor authentication solutions are far more impenetrable but, compared to UNPs, adoption rates remain comparatively low, largely because the multifactor approach fails to deliver a smooth and convenient user experience.

100

Physical authentication tokens, often used in e-banking, are easily lost or stolen but more importantly the authentication process itself is laborious. Typically, receipt or generation of a random key or number sequence occurs on one device (a smartphone), which must be combined in some way with another unique piece of information known only to the user, before being inputted into a second device (laptop, tablet, PC etc.). Replacing all UNPs with this multistep model is no solution at all; today we login to so many different platforms that interruption and end-user frustration would dominate the digital experience. Enter biometrics. There is little doubt that the future of digital identity lies in using multiple factors to verify a user’s authenticity. The key difference

Security Solutions Today • September / October 2017

will be that one or more of those factors will be delivered biometrically, enabling the authentication process to be vastly simplified and greatly accelerated. Apple’s Touch ID is an excellent example of how a biometric can make an authentication process, both fast and convenient as well as secure. Indeed, with biometrics ‘in play’, a digital world in which the authentication process disappears entirely from the user’s experience could be right around the corner. When appropriately deployed, behavioural biometrics such as typing styles, app navigation habits, or the pressure applied to touchscreens, leave a data trail almost as distinctive as a fingerprint or face. The identifying power of these behavioural factors can be harnessed by multifactor authentication solutions and, when combined with conventional biometric data, can be used to continually and automatically confirm and reconfirm the user’s identity without interrupting their user experience with off-putting ID challenges. Adaptive and risk-based authentication solutions are also gathering momentum. These solutions monitor the user’s daily journey through their apps, platforms and devices and use this data to ensure an authentication challenge is only issued when the system deems it absolutely necessary, according to predetermined policies set by the issuer. When these fields are mastered, biometric-powered multifactor authentication will finally unify the age-old opposing forces of convenience and security, and a brilliant and incredibly secure enduser experience will be established.


SECURITY FEATURE

Imagine almost never having to be challenged again when logging into a cloud service, a mobile app, social platform, collaborative workspace, email inbox, remote VPN… We are not there yet. More work needs to be done to identify and increase the reliability of behavioural biometrics. Capture technologies are still developing and their integration into intelligent solutions must be handled with care if we are to stay ahead of the hackers. Privacy issues also remain a key concern, as does the storage and sharing of biometric data once it has been captured. This is the space inhabited by the Biometrics Institute Digital Services Working Group, which is one of the few places globally where the boundaries of these solutions are being explored in an open, collaborative and commercially neutral forum. Crucially, it encompasses the full spectrum of stakeholders too, including academics, vendors, endusers and privacy advocates.

The identifying power of these behavioural factors can be harnessed by multifactor authentication solutions and, when combined with conventional biometric data, can be used to continually and automatically confirm and reconfirm the user’s identity without interrupting their user experience with off-putting ID challenges.

The importance of this work cannot be overstated. Collaborative efforts are essential to ensure the true enabling power of biometrics can be realised in the digital space without putting the individual’s biometric data at risk. Cross-industry collaboration at the Institute also accelerates the evolution of these technologies, shortening the lead time before full deployments are possible and end users benefit. In this instance, this can’t come soon enough. The world of digital services is evolving at a tremendous pace and the threats to personal data security are increasing as a result. Only when biometrics have been successfully integrated will multifactor authentication solutions be able to deliver the user experience demanded by today’s digital consumer. Mass adoption will then follow and all that inhabit digital world will be safer for it. For more information, please visit: www.biometricsinstitute.org sst

September / October 2017 • Security Solutions Today

101


SECURITY FEATURE

BOSCH OFFERS INNOVATING SECURITY WHERE NEEDED FF By Bosch Security Systems

Video not only offers peace of mind – but so much more

I

n the retail industry, video surveillance usually forms the basis of a business’ security system. Reducing shrinkage and providing evidence in the event of theft have traditionally been the main motivations for installing cameras. Over the last decades, development has been largely focused on higher resolution and better image quality, and these aspects are still important today. However, with the advent of digital cameras and built-in intelligence, entirely new applications have appeared on the horizon, offering not just peace of mind, but real business value also. In the retail industry, shrinkage is one of the most significant challenges faced by companies. On a global basis, shrinkage cost retailers some 110 billion Euros in 2015 alone1. About half of the damage is the direct result of not only thieving customers, but employees as well. In Germany, dishonest employees account for approximately four percent of all theft, but are also responsible for more than a quarter of the losses. The majority of this is due to so called “sweet-hearting”, where employees operating cash registers give away

102

Security Solutions Today • September / October 2017

merchandise to friends and family without charging them. Even suppliers must be taken into account - almost 5 percent of all shrinkage comes down to merchandise never even making it to the shelves2. Due to the competitive nature of the retail industry, a market with relatively low margins, it is obvious that retailers in all market segments must invest into suitable technologies to reduce shrinkage as an integral part of their overall safety and security strategy. The primary goal of such a strategy will always be to provide optimal safety for staff, customers and suppliers with fire detection technologies being the heart and soul of the system. As not all theft occurs during store hours, an intrusion detection system may also be necessary. And once such an intrusion detection system is in place, it can, with the appropriate technology, even double up as a real money saver when you implement additional detectors on freezer and fridge doors in a grocery store that will alert staff when such doors are still open when the system is being armed at night. Integration of different safety and security systems by means of a central management system can greatly increase security levels and operational efficiency, as video can then automatically be used to verify alarms from the other systems.


SECURITY FEATURE

New developments such as Bosch’s starlight technology have brought breakthroughs such as light sensitivity in cameras; showing color images where traditional cameras can show only black and white and showing black and white where others show no image at all. While such technologies may not be required on the well-lit shop floor during store hours, they can offer tremendous benefits when outdoor areas and storage rooms must be monitored as well.

While fire protection is generally required by law and the related investment is thus unavoidable for shop owners, the installation of other security systems is usually driven by business decisions alone. A common reason for the installation of such systems is a crime or security incident that captures the attention of retail management. However, more and more often the mere potential of such incidents calls for state-of-the-art technologies to prevent such crimes in the first place.

Prevention and Detection When talking about shrinkage and security in a retail setting, video surveillance is usually the first thing that springs to mind and for good reason: Video surveillance can both prevent theft and help to identify thieves after the act, once prevention has not succeeded in deterring them. It can be used to pinpoint suspicious behavior on the shop floor just as it can secure non-public areas such as warehouses or offices and while one or two general-purpose cameras may be sufficient to secure a small retail outlet, there are also sophisticated and specialised solutions for monitoring cashier desks, outdoor areas, parking lots, warehouses and other parts of the premises. It is little wonder therefore that some form of video surveillance can be found in almost every retail store around the globe. However, not all make full use of the potential of today’s cameras. Technology has greatly improved in recent years, mainly due to digitalisation. State-of-the-art built-in video analytics in network cameras not only deliver ultimate high-resolution

September / October 2017 • Security Solutions Today

103


SECURITY FEATURE

images, even under challenging lighting conditions; they also can act as an enabler of entirely new applications beyond mere surveillance, offering real business benefits. As one would expect, image quality and thus resolution has been one of the major areas of focus. Yet, while we have witnessed dramatic increases in resolution in digital consumer products, development has been somewhat slower with surveillance cameras. There is a simple reason for this: surveillance camera images have to be managed, transmitted and analysed in real time, and usually they must also be stored and kept for a certain amount of time. It is not uncommon for the storage system alone to account for half the cost of a video surveillance solution, and transmitting highresolution images in real time puts a lot of burden on the underlying network. This is why current developments do not focus on resolution alone, but also on advanced technologies to reduce the data volume associated with video surveillance without losing relevant image information. Today, many current surveillance cameras offer HD or even 4K ultra HD resolution with up to 8 megapixels. Such cameras can deliver very detailed images, greatly improving the operator’s ability to detect suspicious activity. Further, new developments such as Bosch’s starlight technology have brought breakthroughs such as light sensitivity in cameras; showing color images where traditional cameras can show only black and white and showing black and white where others show no image at all. While such technologies may not be required on the well-lit shop floor during store hours, they can offer tremendous benefits when outdoor areas and storage rooms must be monitored as well.

104

Another interesting development for retailers is the advent of panoramic cameras. With their 180- or 360-degree overview in a single image they solve the wellknown problem of blind spots. Panoramic cameras for both indoor and outdoor environments are readily available from Bosch with resolutions of up to 12 megapixel and 30 frames per second, offering high quality video around the clock. They offer a complete overview of a particular area in one simple view without blind spots allowing the easy capture of moving objects in that area. Significantly improving the performance of the video surveillance solution. Combined with Bosch Video Security Client software the user can select up to 6 different viewing modes.

Breakthrough Imaging Bosch IP cameras come with Content Based Imaging Technology. This Bosch innovation intelligently combines information from the sensor, image pipe, encoder and its video analytics to dynamically optimize the image for every scene. An option enabled by CBIT and available on selected cameras is Intelligent Auto Exposure, which ensures the perfect picture in every situation regardless of lighting conditions. Intelligent Dynamic Noise Reduction technology, which is standard in all Bosch IP cameras, reduces the bitrate by up to 50 percent by cleverly optimising the detail-to-bandwidth ratio without compromising video quality. “Reducing bandwidth without compromising image quality is one thing, however shop owners cannot be everywhere at all times, especially in a small to medium sized business. That is why Bosch offers Dynamic Transcoding technology. By applying this technology, high-resolution images or smooth video streams can be viewed from any location that

Security Solutions Today • September / October 2017

Advanced video analytics, such as Essential Video Analytics and Intelligent Video Analytics from Bosch allow for custommade detection algorithms to intelligently detect or track objects of interest.


SECURITY FEATURE

has access to the internet, even in the event of slow mobile internet connection. The free Video Security app, available for both iOS and Android devices, offers instant real-time access to video. It also allows users to scroll through various camera locations with a single swipe and control their cameras including pan, tilt, zoom and focus functions. To view multiple sites or cameras simultaneously, users can make use of the free Video Security Client. This viewing software supports desktops, 2-in-1 laptops and mobile devices running Windows 8. By combining one of the mentioned free viewing clients, or the Bosch Video Management Software with built-in video analytics, users can easily conduct forensic searches on recorded video from anywhere at any time. This can offer valuable information to security staff or police during their investigation of an incident.

Video Analytics B u i l d i n g intelligence into the camera not only delivers better images, but also greatly improves the manageability of data, overall security and forensics. Today’s network-based monitoring and video content analysis enables a significantly more accurate detection of incidents, as lack of concentration and other human errors are excluded from the outset. Secondly, they make security staff more efficient, since operators only have to respond to alerts rather than continuously monitor a huge number of live images. This allows operators to spend more time on other tasks. Accuracy and speed are both increased using metadata instead of the actual video recordings. Such metadata consists of small text strings describing objects or movements, which are much smaller than the images themselves and can be searched fast and automatically. Advanced video analytics, such as Essential Video Analytics and Intelligent Video Analytics from Bosch allow for custom-made detection algorithms to

intelligently detect or track objects of interest. For example, when an object such as a car with a certain size and color moving at a certain speeds crosses a line an alarm needs to be triggered or (in case of a moving camera) the objects needs to be tracked. As soon as this algorithm is defined, the system will automatically either trigger an alarm or starts to intelligent track an object that meets the pre-defined criteria.

Adding business Value with Video Analytics Going way beyond security applications, Essential Video Analytics or Intelligent Video Analytics can also act as an enabler of an entirely new application in retail environments. Few of these can be found in real world stores today, but will clearly become more popular in the next couple of years as they can offer tremendous added value without the need for substantial investments. One such example is a combination of crowd density and movement information for the optimisation of shop layout. Another example would be the combination of people counting and object in field information, which can deliver useful information for the analysis of in-store promotions. Integrate such a solution with your POS systems, and you will even be able to calculate conversion rates. For example, while the POS application knows exactly how many units you have sold, video analytics or intelligent video provides information concerning the number of people who have passed by an in-store promotion (people counting) and those who have lingered in front of the promotion for more than 30 seconds (object in field information), which could indicate interest. When these numbers are compared with the actual number of units sold (POS system), it will indicate a certain gap. This could mean that although people seem to indicate interest (by lingering in front of a display longer than

September / October 2017 • Security Solutions Today

105


SECURITY FEATURE

Chains can also use statistical data from intelligent video surveillance to benchmark their individual outlets or to directly compare how different presentations of goods influence customer behavior.

30 seconds), another element, such as price perhaps did not meet their expectations. Based on these statistics, in-store research could be conducted to determine why such a display of interest did not converted into a sale. In the long term, data generated by either Essential Video Analytics or Intelligent Video Analytics could play a vital role in improving in-store marketing.

field of retail for the improvement of security, to help keep data manageable but also to enable value add to business, Bosch will offer built-in video analytics in all of its network cameras starting from the IP 4000 series in the next 12 months.

Chains can also use statistical data from intelligent video surveillance to benchmark their individual outlets or to directly compare how different presentations of goods influence customer behavior.

With FLEXIDOME IP panoramic cameras from Bosch, storeowners will never miss anything again. The FLEXIDOME IP panoramic 7000 MP indoor camera offers a full 180-degree or 360-degree overview of a particular area with 12 megapixel sensor resolution at 30 frames per second combined with a fish-eye lens. For indoor and outdoor applications, the FLEXIDOME IP panoramic 5000 MP offers the smallest 360-degree dome design available on the market combining a five megapixel sensor resolution at 15 frames per second with a fish-eye lens. Both camera models ensure a complete overview in a single image without blind spots and the easy capture of moving objects, significantly improving the performance of retail video surveillance solutions. Combined with the Video Security Client software, the user can select up to six different viewing modes. The FLEXIDOME IP panoramic 7000 MP camera features a full suite of on-board intelligent video analytics to ensure that operators are alerted when needed and relevant information is delivered most efficiently both live and in retrospect.

Customer service is another interesting area of application where this technology could improve retail business. For example, queuing information can alert management when a checkout is unmanned or insufficiently staffed, enabling quicker reactions and thus a better shopping experience for the customer. If a camera identifies an individual loitering in front of shelves with high priced items, chances are that this customer will need some attention - either to be helped or to avoid theft. Finally, in large shopping malls or in shop-in-shop environments, one vision is to empower the mall operator to develop rental charge schemes based on real and proven traffic. In addition, such data can be used to detect bottlenecks and hotspots and thus to improve space utilisation within the mall. Recognising the importance of video analytics in the

106

Security Solutions Today • September / October 2017

No More Blind Spots

For more information, please visit: www.boschsecurity. com sst


SECURITY FEATURE

Five Ways

to Reduce your Ransomware Risk

FF By Gene Tang, Head of Solutions Architecture at Rackspace Asia

T

he speed and pervasiveness of the recent WannaCry ransomware attack took the business world by surprise. The extortion malware infected computer networks in more than 150 countries, leaping from Spain, the UK and Germany to Russia, India, China and the US as it spread around the world. Within hours, hundreds of thousands of computers were displaying locallanguage versions of the same ransom note: your files have been encrypted, pay the ransom or lose everything.

Gene Tang

is the Head of Solutions Architecture at Rackspace Asia and he has a strong passion for technology – working with clients to help shape their IT strategy and design IT architectures that help fulfill their business objectives. Gene has been in the IT industry for more than 10 years, working with businesses across EMEA, APAC and ANZ. He has worked in numerous roles from software development to solution architecture and design and has spoken at multiple industry-recognised events to evangelise and help businesses recognise the value of Cloud and Big Data.

Early victims included hospitals, banks, telecom firms and transport companies. Organisations in these industries can’t function without access to their digital data, which makes them attractive to cyber criminals. But they can have another vulnerability, too. Many will be burdened with old networked devices running out-of-date software that hasn’t been patched because of the complexity of the network and the difficulty of shutting down systems for updates. So, what are companies to do? In the wake of cyberattacks such as WannaCry, it’s far too easy to be distracted by the drama of hard-drive encryption and demands for payment. Please remember, though, that payment does not guarantee that your files will be unlocked, and most security experts recommend that you don’t give in to a ransom demand. The real lesson of WannaCry is that poor risk management leaves you vulnerable. This boils down to vendors’ poor software security and businesses’ lack of proper prevention. Here are five things you can do to avoid falling prey to ransomware:

September / October 2017 • Security Solutions Today

107


SECURITY FEATURE

1

2

3

4

Back Up Your Data

Maintaining recent backups of your data is essential. Companies that followed this fundamental best practice could safely ignore the WannaCry ransom demand and revert to stored files with little data loss – unless their backup strategy relied on a local storage device, that is. A multi-layered strategy that takes advantage of cloud backup and has a robust approach to redundancy is recommended.

Keep Up with Patches

WannaCry hit computers running older versions of Microsoft software that had not been updated, even though patches that fixed vulnerabilities were available. Patch management has been and will continue to be a challenge for many organizations and end-users. Simply keeping up with the latest patches for Windows, Mac and Linux operating systems and your third-party applications will go a long way to reducing your exposure to ransomware.

Check Your Security Software

Be sure that you have security software installed and that it’s up-to-date. New malware surfaces every day, so keeping current with your anti-virus software helps keep your data safe. Given the complexity of today’s computing networks, with mobile, enterprise and cloud environments, and our fast-evolving threat landscape, third-party security expertise can be the best way to achieve active and ongoing cyber defense.

Educate Staff to Spot Scams

WannaCry’s sneaky worm component helped it to spread by exploiting a weakness in a Windows filesharing protocol, but it was the usual phishing emails and dodgy attachments that opened the door to it. Employee awareness is crucial in avoiding a ransomware attack. Staff should be coached on how to spot scams, and urged to take the time to pause and check emails that don’t look right.

5

Take the “Security First” Approach

Weave security awareness and practice into your process from beginning to end. DevSecOps is a concept that emphasises the importance of integrating security into all parts of IT system development and operations, rather than leaving them disconnected. While perfect security is not possible, concepts like this bring it closer.

“Employee awareness is crucial in avoiding a ransomware attack. Staff should be coached on how to spot scams, and urged to take the time to pause and check emails that don’t look right.” In our era of random but persistent threats, such as ransomware, managing security is becoming more challenging by the day. By being proactive, getting the basics right and moving away from some of the more problematic platforms, you can certainly keep many of these threats at bay. sst

108

Security Solutions Today • September / October 2017


SECURITY FEATURE

The Age of Containerisation and its Impact on Security FF By: Dick Bussiere, APAC Technical Director of Tenable

A

defining characteristic of software development and deployment is its constant evolution. Virtual machines (VMs) first appeared in the 1960s, and developers soon scaled it to commercial levels. Customers saw VMs as an ideal solution to enable easier server consolidation and drive disaster recovery and IT optimisation. Since 2010, server virtualisation has become the norm rather than the exception. This model was supported by traditional “waterfall” software release methodologies, along with operations and software development working in different silos. However, these traditional models are changing, fueled by demand for increased productivity, accelerated innovation and faster go-to-market release of digital products and services. This has forced a rethink of how application development and deployment takes place. Rather than having software development and operations separated, the two are now being integrated into a single unified function - DevOps. DevOps brings with it the concepts of continuous integration (CI) and continuous development (CD), which means that small incremental changes to applications are being made all the time. This is a stark contrast to the traditional waterfall development methodology.

September / October 2017 • Security Solutions Today

109


SECURITY FEATURE

“Tenable’s 2017 Global Cybersecurity Assurance Report Card, found that security teams’ confidence in their organisations’ ability to mitigate risk in these categories is worryingly low, with containerisation platforms (52 percent) and DevOps environments (57 percent) each receiving a failing grade.“

The trend towards DevOps is also forcing a rethink of how software is deployed. Rather than the legacy virtualisation model used for years, a more efficient model has emerged. This technology, called containerisation, allows for more efficient use of hardware resources by facilitating the sharing of a single operating system instance with multiple segregated applications.

Benefits of Container Technologies Container technologies have been revolutionary in their ability to enable fast application deployment and migration to the cloud. They not only reduce the required resources for deployment, but they can be brought online or quickly deleted in a matter of seconds. Containers also allow applications and processes to be consistently deployed across multiple clouds, which facilitates faster, more confident enterprise adoption of cloud services.

“DevOps teams are often focused on speed rather than security. Some platforms, such as Docker, allow users to pull pre-built images from public repositories. While efficient, this can expose networks to unknown threats and vulnerabilities. “

110

Security Solutions Today • September / October 2017

Containers are lightweight and portable, with everything needed at runtime, including all code and supporting libraries. In fact, containerisation takes IT automation to a whole new level when combined with orchestration technologies, such as Kubernetes, which facilitates totally elastic computing models. We are now seeing the evolution of software defined infrastructures (SDI) where services can be provisioned and automatically deployed across large compute infrastructures. Applications developed using containerisation is an important part of this technology. Unlike VMs, containers share operating systems and use only the resources they need to run the application they’re hosting, resulting in greater efficiency. Hundreds of containers can run on just one server, saving valuable data centre budget. Not surprisingly, the remarkable benefits of DevOps deployment methods, a technology that is still in its infancy, have led to an incredible rate of adoption. In a 2016 global survey, 53 percent of companies with at least 100 employees had either deployed or were in the process of evaluating containers and once an organisation invests in containers, their use expands rapidly. In its report, Docker Containers Will Impact Enterprise Storage Infrastructure, Gartner predicts that by 2022, more than 20 percent of enterprise primary storage capacity will be deployed to support container workloads, up from less than one percent today. However, containerisation comes with growing pains. As with any new technology development, industry excitement often overshadows security until


SECURITY FEATURE

organisations recognise the need to address the new set of risks.

Security Implications of Containers

“As more enterprises migrate their existing and customer-facing apps into container environments, it will become critical that organisations recognise and address the need for a new security approach, ensuring that security is integrated into the DevOps process from the very beginning.”

As traditional VMs typically exist for weeks, security issues are more likely to be caught during a weekly or monthly scan and patch cycle. But containers can exist for just minutes, and the periodic scanning approach simply doesn’t work. Beyond this, containers cannot be scanned using traditional vulnerability assessment tools, since the services that these tools require are not present in container images. This means, new methods of vulnerability assessment must be embraced. DevOps teams are often focused on speed rather than security. Some platforms, such as Docker, allow users to pull pre-built images from public repositories. While efficient, this can expose networks to unknown threats and vulnerabilities. It is the very advantages of containers that make them such a security risk. Containerisation allows the dynamic and elastic deployment of software, but this means the attack surface is constantly evolving. A key strength of containers is their ability to be spun up or down almost instantly. But with an average lifespan of just a few hours or days, how can security teams effectively assess risk? Their short lifespan and ability to be instantly deleted or replaced, key benefits when only concerned with speed of deployment, can cause a lack of visibility. A major concern is that enterprise adoption and deployment of DevOps and containers is outpacing the approach used to secure them. Tenable’s 2017 Global Cybersecurity Assurance Report Card, found that security teams’ confidence in their organisations’ ability to mitigate risk in these

categories is worryingly low, with containerisation platforms (52 percent) and DevOps environments (57 percent) each receiving a failing grade.

Integrating Security Into the Devops Innovation Cycle Organisations continue to struggle with container security because traditional security approaches, first designed for physical servers and then for VMs, cannot cope with today’s dynamic IT environment.

Server or device-centricsecurity simply doesn’t work in the new app-centric enterprise, which means organisations must rethink their approach to cybersecurity. Vulnerability scanning needs to be integrated into the DevOps innovation cycle. Each container must be scanned as it’s built, before it’s put into production and while it’s in production. Doing so will ensure that vulnerability and malware detection occurs throughout the lifecycle of every container. Recognising the critical importance of vulnerability scanning, Gartner expects that “by 2018, 60 percent of enterprises will mandate container vulnerability scanning, up from less than 30 percent in 2016.” [Gartner source: “Security Considerations and Best Practices for Securing Containers” by Neil MacDonald published Nov. 10, 2016]. Introducing security into the DevOps process at the same speed as DevOps itself is starting to gain momentum as organisations transition into DevSecOps. DevOps teams are having a larger say in networking and infrastructure security tools, and as containers have grown in popularity, so too have the tools available to help secure them. As more enterprises migrate their existing and customerfacing apps into container environments, it will become critical that organisations recognise and address the need for a new security approach, ensuring that security is integrated into the DevOps process from the very beginning. This is the only way for organisations to get the operational benefits of containers, while also reducing their level of exposure and risk. sst

September / October 2017 • Security Solutions Today

111


SECURITY FEATURE

SMART CITIES AND CYBER THREATS C

ontrol Risks’ Cyber Security Services provide threat intelligence, protection and response in the face of a continually evolving cyber threat landscape.

Smart cities will provide businesses with unprecedented economic opportunities. However, cyber threat actors will be presented with an unprecedented attack surface in smart cities because of the significant increase in the number of interconnected devices. Securing these cities needs to be a joint project involving the local administrations and the private sector organisations with an immediate stake in the continuation of the city’s stable function. Ensuring that these cities are cyber secure will require the identification and prioritisation of critical assets, behaviour based security – establishing a benchmark of normal operation of critical assets and continuously ensuring that all parts of the city adhere to said benchmark, rapid component replacement in the event of compromise or failure and the secure segmentation of critical private assets from the city network.

112

Security Solutions Today • September / October 2017

FF By Nicolas Reys, Consultant, Cyber Security Services


SECURITY FEATURE

Faced with rapid urbanisation, city planners are turning to technology to solve a wide range of problems associated with modern cities. Smart cities are the outcome of this deepening integration of technology with new or existing urban landscapes. They are set to change how we experience and what we come to expect from the cities around us. In practical terms, these transformative effects will arise from the combination of three pieces of technology: inexpensive logic controllers, millions of sensors connected to devices dispersed across a city and a network that connects all of these nodes together and enables real-time communication. Such connectivity will enable a better and more efficient provision of urban services. Amsterdam, Barcelona, Santa Cruz and Stockholm have begun the process of incorporating elements of a “smart grid” – or a network of interconnected sensors within the city – across many of their urban domains such as energy provisions, transport systems and telecommunications infrastructure. The inhabitants of these cities have already begun to feel the benefits. However, increased connectivity carries with it potentially severe cyber security risks that have yet to be fully revealed and, in many cases, mitigated.

How Smart Is Smart? The concept of smart cities relies on three fundamental ideas: 1. Physical infrastructure can be used more efficiently as data analytics and artificial intelligence progress. 2. Engagement of the urban population with the city administration can be achieved through e-participation – or the carrying out of civic duties through the internet. 3. As technology continues to progress, computer systems will learn and adapt to challenges autonomously. The benefits of and opportunities presented by smart cities - for both citizens and businesses - are broadranging. With proper implementation, smart cities will provide tremendous economic, social and cultural advantages for their inhabitants. For instance, a city’s electricity infrastructure could be significantly improved with the introduction of technologies

such as ‘smart meters’ – electric or gas meters that provide real-time data, via an internet connection, to the consumer and the electricity company regarding each user’s consumption. This allows better management of electricity supplies by tailoring them to the live demand, thereby reducing overall cost as well as the impact and incidence of power outages. Indeed, smart cities are dependent on machine-tomachine (M2M) interactions and decision-making. This is, in part, a product of the sheer number of inputs and the frequency and speed with which associated calculations need to be completed. In the case of the energy grid, it would be impossible for a human operator to process all the data necessary to make decisions at the speed required by the system. However, while M2M decision-making (M2MD) is an unavoidable and beneficial feature of smart cities, it is also one of the greatest risks.

New City, New Risk M2MD is a highly promising means of ensuring efficient automation across smart cities. However, given the absence of human operators, the risk of a cascading error is significant. A cascading error refers to the potential for a small, unchecked mistake to spread through a system and become a systemic risk.

September / October 2017 • Security Solutions Today

113


SECURITY FEATURE

For instance, if a minor computing error caused a smart electricity reader to transmit inaccurate data readings to its control centre for a period of time this could lead to an automated, and mistaken, assessment that a particular private organisation’s premises required an increased amount of electricity. This would necessitate rerouting some of the existing energy supply to this facility which, in turn, could culminate in increased costs for the affected business, as well as for the city, and a reduced pool of electricity for other companies and citizens. Although minimal at this scale, the consequences of such errors when they affect a larger area – an entire block or an industrial zone for example – could be far more substantial.

Smart Cities and Cyber Threats Beyond the potential for human or computer error, smart cities will provide cyber threat actors with a large attack surface to target and potentially exploit and incorporate into broader campaigns:

Cybercriminals As we have described above, smart cities will be composed of thousands – if not millions of interconnected devices. Such a structure is a boon to criminal actors able to create or purchase and subsequently deploy self-propagating malware, variants of which have been known to proliferate across multiple connected networks. These ‘worms’ could be used to acquire easily commoditised information such as healthcare information, social security numbers and banking credentials, or even to take control of a significant number of systems. Were attackers able to successfully hijack these systems they could then be used for extremely powerful distributed denial of service (DDoS) attacks or to hold an entire city for ransom in extortion attacks. Ransomware variants could be designed to encrypt and cripple an entire city’s grid, with ransom demands likely to be considerable in such a scenario. These tactics could be highly profitable for cybercriminals and represent a natural evolution of trends that we have observed in the current cybercriminal community. Incident response will become increasingly difficult in the case of city-wide compromise. Private sector organisations and municipal authorities will share ownership of systems and the responsibility for their security. Beyond adding legal and financial costs for the private sector, this will create the need for highly complex pre-planned incident response

114

Security Solutions Today • September / October 2017

schemes involving multiple parties.

Cyber Activists As cyber activist groups grow increasingly capable and in some cases, more radical, smart cities will provide them with an attack surface enabling a broad range of attacks from those akin to nuisances such as defacements of a city’s billboards, to the more extreme targeting of a smart city’s energy grid with the aim of physical destruction. In addition, many cyber activist groups are supporting physical protesters by launching cyber attacks. This practice in a smart city environment could allow cyber activists to take a leading role in coercing governments and private sector organisations in meeting their demands. The potential destructiveness of a cyber attack on smart cities is such that even the threat of compromise of the city’s system is likely to be treated by governments and businesses as an existential one. When threat actors such as cyber activists, who arguably lack the self-control of other groups, have the possibility of causing serious physical damages, the security of smart cities becomes essential to the cities’ survival.

Nation States As the underlying network of smart cities will encompass most aspects of life within the city, if that network were to be compromised by an attacker, it would grant them unfettered access to a target individual or organisation. For instance, state-owned competitors could compromise a smart city’s infrastructure to gather intelligence on a large number of rival private sector firms. This information could include movements of their executives within the city, private and commercial communications grabbed from the ubiquitous presence of ‘free Wi-Fi hotspots’ managed by the city, and many more. Moreover, organisations operating within the city are likely to have their networks overlap to some extent with the city’s own network, or at the very least, have frequent data transfers from their networks to that of the city. This would enable highly advanced threat actors such as nation states to exploit weaknesses within a city’s infrastructure to reach a target organisation and compromise the confidentiality of its network. Beyond traditional espionage operations, the large-scale


SECURITY FEATURE

destruction or disruption of physical infrastructure via computer systems could become a technical reality with the advent of smart cities. The interconnectedness of systems within smart cities will lead to the reliance of components on the availability of the entire system to function properly. As such, an advanced cyber attack seeking to destroy parts of the system could have catastrophic cascading effects onto the wider network. This would enable a determined nation state actor to cause large-scale physical destruction throughout an entire city. Although indirect, a belligerent nation state actor could abruptly interrupt the traffic light system of an entire city to cause significant damages and potentially the loss of human lives. Similar scenarios are conceivable for the interruption of energy supplies or water networks. Whilst such events will become more plausible with the increase in smart cities, the actual likelihood of them being undertaken is low because of the possibility that such an attack would provide a potentially justifiable basis legally and ethically, for military retaliation, something which the perpetrator would presumably appreciate.

Securing the Implementation of Smart Cities for the Private Sector Although the exact form that smart cities will eventually take remains uncertain, organisations and city planners can take a number of precautions to ensure a smoother implementation process and, ultimately, more secure infrastructure.

Prioritise the security of critical assets Contemporary networks are already impossible to protect in their entirety, a problem which will apply equally to smart cities. Some components of the system will have to be made more secure than others. Public and private sector organisations will need to work together to identify the city’s critical assets and oversee the institution of appropriate security measures.

Behaviour based security: Auditing millions of separate devices for signs of malware is simply not feasible. A more workable approach would be to evaluate the behaviour of smart city components and systems against an established baseline of normal functionality or network behaviour. Any significant deviation from the norm above a determined threshold would trigger an investigation into the possible presence of malware on the subcomponents.

Rapid component replacement: Given the potential for component failure or attacks compromising these components, an automated replacement system will enhance the security of the whole system. Although difficult to apply to critical components without full redundancy, such measures would be suitable for low-level, relatively isolated components.

Segment critical assets of private organisations from the city’s network: Paramount to the security of organisations in the smart city environment is the segmentation of their critical assets from the city’s network. Although costly and potentially reducing the effectiveness of the organisations, this policy will enable organisations to contain and mitigate any threat actors exploiting vulnerabilities in the smart city network to reach their assets. For more information, please visit: www.controlrisks.com sst

September / October 2017 • Security Solutions Today

115


SECURITY FEATURE

Huawei Releases C-C4ISR

Collaborative Public Safety Solutions at Global Safe City Summit 2017 Launching first all-cloud and matrix intelligence Video Cloud Solution and Crisis and Disaster Management Solution

H

uawei hosted its Global Safe City Summit 2017 themed “Leading New ICT, The Road to Collaborative Public Safety” in Dubai from April 26-27. More than 350 government customers, industry experts, and partners participated in the summit to share their experience and opinions, and promote digital transformation of the public safety industry. During the summit, Huawei introduced the C-C4ISR Collaborative Public Safety Solutions, which will drive digital transformation of the global public safety industry. Together with world-leading public safety partners such as YITU, SenseTime, Zenith, iOmniscient, and GSAFETY, Huawei also released the first all-cloud and matrix intelligence Video Cloud Solution and Crisis and Disaster Management Solution. The solutions are

116

Security Solutions Today • September / October 2017

designed to address diverse safety threats and protect citizens in cities across the world. With increasing global urbanisation, cities are expanding and becoming less safe. Governments are increasingly focused on developing safe cities and aim to reshape urban public safety systems through innovative ICT. However, traditional siloed public safety systems typically lack information sharing capabilities and are major barriers to effective collaboration between different government agencies, which is essential for prevention of and response to emergency situations.

C-C4ISR Collaborative Public Safety Solutions Will Be the Core of Public Safety Systems Commenting on public safety, Fan Siyong, President of Public Sector of Huawei Enterprise Business Group, said: “As cities embrace digital transformation, new safety threats are emerging that need to be addressed by the public safety industry. We need to keep pace with social and technological developments and shift from a traditional city safety construction model to one of collaborative public safety. By building cross-region


SECURITY FEATURE

and cross-agency collaborative public safety systems that connect governments and citizens, we can help cities better prevent, detect, handle, and recover from various threats. The ‘collaborative’ method of C-C4ISR will be fundamental to digital transformation of the public safety industry. Using new ICT such as Internet of Things (IoT), Big Data, mobile broadband, and SoftwareDefined Networking (SDN), as well as cloud-pipe-device synergy, the solution will drive efficient collaboration among governmental agencies as well as between governmental agencies and citizens.” The Collaborative-C4ISR or C-C4ISR includes C-Command & Control, C-Communication, C-Cloud, cross-agent C-Intelligence based on Big Data, serviceoriented C-Surveillance, and C-Reconnaissance leveraging numerous access technologies of various types of devices, such as IoT and drones. “Collaborative”

is the core feature of the C-C4ISR, enabling crucial visualisation and convergence to maximise public safety. During the summit, HongEng Koh, Global Chief Public Safety Expert of Huawei Enterprise Business Group, stated: “In today’s digital world, platforms and ecosystems are accelerating digital transformation of cities and changing the way people connect and communicate, such as using Facebook, Uber, and WeChat. In this new era, crimes and other threats are rapidly developing and public safety agencies need advanced technology that enables inter-agency collaboration to handle emerging threats and challenges. Huawei’s C-C4ISR platform and partner ecosystem are helping agencies to develop a collaborative public safety method that can help them maintain control over fast-changing situations.”

Huawei Releases the First All-Cloud and Matrix

September / October 2017 • Security Solutions Today

117


SECURITY FEATURE

Intelligence Video Cloud Solution, Supporting Cross-Region and Network-Wide Sharing Currently, social video and numerous public safety video systems are typically constructed independently, which results in a lack of data sharing and analysis between government agencies and regions. Cross-regional crimes are increasing and without a collaborative cross-region video solution, collecting and analysing information consumes a significant amount of time, manpower, and costs, which is both inefficient and can delay a timely response. Huawei is launching the first all-cloud Video Cloud Solution featuring distributed matrix intelligence. Cloud resource pools support global scheduling and flexible scaling, meeting cross-agency requirements and helping agencies better handle incidents. The solution integrates Big Data technology and can be applied in a variety of scenarios. Bai Jianhua, General Manager of Government Solution Department of Huawei Enterprise Business Group, said: “Based on an open cloud platform, the Video Cloud Solution can support partners’ various intelligent analysis algorithms and many practical video services. With matrix intelligence architecture design, the Video Cloud Solution provides distributed analysis capabilities at the center, edge, and frontend layers. This enables many functions, including local data storage, nearby computing, and automatic results connection and convergence. When cross-agency and cross-region tasks are delivered, the system can respond with analysis

results in seconds, realising data-driven ‘smartness’. Additionally, the Video Cloud Solution can provide various public services, such as the traffic guidance, crowd detection in scenic spots, and searching services for lost people, for other organisations and agencies.”

Crisis And Disaster Management Solution Converges Iot and Big Data to Deliver Early Warning Capabilities According to the United Nations’ statistical analysis , mortality and property losses caused by disasters and incidents is growing. Many factors, such as a lack of disaster assessment and preparedness, poor early warning capabilities, and lack of cross-agency collaborative command and dispatch, bring various challenges to crisis and disaster management. At the summit, Huawei shared how it has cooperated with industry-leading disaster management partner GSAFETY to release the Crisis and Disaster Management Solution integrating IoT and Big Data full-lifecycle for the first time. The solution builds the infrastructure platforms through front-end IoT perception, agile networks, and cloud-based data centers. The solution integrates many modules, such as intelligent surveillance, Big Data, IoT platform, critical communications, and converged command, to support the prevention, preparation, detection, warning, handling and rescue, and summary components of crisis and disaster management. This significantly improves government emergency departments’ practical capabilities, better protects human lives and properties from disasters, such as the typhoon, flood, and hazardous chemical leakage, and helps people take preventive measures. With the “Openness, Collaboration, and Shared Success” principle of the Huawei Safe City Solution, Huawei is committed to closely cooperating with world-leading partners in many industries, such as consultation and planning, system integration, and software applications. Huawei works with partners to develop a mature Safe City ecosystem and build one-stop Safe City solutions. Nowadays, Huawei Safe City solutions have been serving about 800 million people in more than 200 cities of over 80 countries in multiple regions, such as Europe, Africa and Asia Pacific. For more information, please visit: http://e.huawei.com sst

118

Security Solutions Today • September / October 2017


SECURITY FEATURE

New Program from Toshiba Helps Schools Reduce Ownership Cost of Video Surveillance Systems 

I

rvine, California, USA - Toshiba Surveillance & IP Video Products Group, a business unit of Toshiba Information Systems, Inc., today launched its Safe Scholar program to help schools reduce the total cost of video surveillance system ownership. The new program includes pricing discounts, ongoing maintenance, technical support, and customised video management software to qualified educational facilities. “The Safe Scholar program goes well beyond special pricing for schools; it is a comprehensive, turnkey solution that adds long-term system support without additional costs,” said Greg Hartzell, Director of Toshiba Surveillance & IP Video Products Group. “Toshiba recognises the need for educational facilities to be more proactive in responding to emergency incidents to help keep their students and staff safe. The Safe Scholar program is an excellent way to do just that because it is built on Toshiba’s high-quality IP products and backed by our industry-leading technical support.” Hartzell added:  “Toshiba’s Safe Scholar program enables schools to take advantage of a single-vendor solution for their unified video surveillance needs at a significant value.” Standardising the common aspects of a school’s IP video system cameras, recorders, software and accessories - within the single intuitive platform that Toshiba provides maximises the operational efficiencies of security monitoring and better aligns the system to meet unique needs, while minimising operational costs. Authorised Toshiba Surveillance Providers perform all Safe Scholar installation work to ensure operational success. Once the system is installed, a Toshiba employed Technical Specialist will visit the location to conduct a valueadding free commissioning service

September / October 2017 • Security Solutions Today

119


SECURITY FEATURE

“Toshiba’s Safe Scholar program enables schools to take advantage of a single-vendor solution for their unified video surveillance needs at a significant value.”

to test performance features, and determine if it fully meets specified technology goals. Along with the commissioning service, here are some key benefits included in the new program:

120

Monthly Follow-up for One Year: For a period of one year after commissioning, a Toshiba employed Technical Specialist will contact the school monthly to insure its system is running smoothly and trouble-free. No Annual Software Fees: Software updates and upgrades come at no charge for the life of a system, not just the warranty period. This keeps total cost of ownership (TCO) as low as possible.

Pricing and Discounts: Toshiba offers discounted pricing to academic institutions on its IP and analog cameras, network video recorders, digital video recorders, networking equipment, software and accessories. In addition, there are potential discounts from other Toshiba divisions on products such as digital display, notebook computers, copiers and telephone systems.

Mapping: Toshiba will customise the mapping application within the included SCS Video Management Software to ideally meet a school’s requirements. Whether it is multiple campuses spread across several states or a single district or campus, the mapping function provides quick drill-down capabilities to view the exact location needed to be monitored. Camera icons can be placed on maps or satellite images, as well as on school floor plans. Apple Support: Toshiba supports Apple users with a remote client for live view and search, as well as an iOS app. Flexibility: Toshiba provides a complete product line including analog, IP, hybrid and cloud-based products so it stands ready to meet just about any institution’s needs.

System Health Monitoring: Toshiba’s MySurveillix cloudbased service fully manages the health of the school’s installed system. It gives easy-tounderstand visual confirmation that recorders and cameras are in proper working order. It also alerts the operator if problems exist so they can be addressed before a critical video event occurs.

Security Solutions Today • September / October 2017


ALL ABOUT IOT & CYBER SECURITY

eyevis UK Delivers Smart City Project

e

yevis UK and their industry partners have successfully delivered several large Smart City security and transport Operations Centre projects across the UK. They believe that the combination of leading technology, collaboration between all agencies and strategic overview planning are key to maximising the benefits of all the available data. Security and control room video wall experts eyevis UK has its equipment across the country in CCTV control rooms and Operations Centres for local authorities, banks, road traffic monitoring, emergency services, blue chip retailers, security services, prisons and other Government buildings. IBI Group is a globally integrated architecture, planning, engineering, and technology firm which designs every aspect of a truly integrated city.

and personnel.” An example of this is in the Glasgow Council Operations Centre, designed to accommodate multiple agencies and the collaboration and sharing of important data as a huge video wall dashboard. IBI’s Kelvin Summoogum said, “Many would agree that the verticals such as digital technologies, data exchange between systems, IOT, etc. are merely support mechanisms that have been around in the industry for a while but the real differentiator is how effective an authority is in making innovative, or should we say ‘smart’ use of these tools to optimise the use of their resources, reducing cost and more importantly connect and empower their citizens and stakeholders. Video wall gives the Operations Centre the ability to operate and manage at a city-wide level, providing detailed data from a variety of sources in one location and in the form of a city dashboard.

eyevis UK managing director Steve Murphy said that eyevis technology has been selected for Smart City type applications as it provides the highest quality solutions to meet modern requirements, such as proven reliability in 24/7, 365 day operation, the slimmest rear projection cubes to fit into small control rooms, industrial LCD displays, touch screen technology and the most advanced video wall controller solutions.

He added that in this time of austerity it is also vital that cities move away from the culture of empire building among services or even agencies.He added that the company is being involved in an increasing amount of multi-agency collaboration projects where they are co-locating services and agencies such as police, fire and rescue, telecare and security alarm monitoring.

“We provide the collaboration tools to allow the immediate sharing of important real time data from a whole range of sources…more and more importantly from mobile devices and from personnel out in the field who can relay critical images of incidents to assist the effective coordination of required agencies

“The benefits are staggering. The skill to master here is to “sweat the asset” by getting staff trained to offer a very diverse range of services and technology used for multiple applications. Put into context, this could mean getting a parking officer (GPS tracked) to report suspicious and potentially criminal behaviour or traffic continue on page 122

September / October 2017 • Security Solutions Today

121


ALL ABOUT IOT & CYBER SECURITY

issues which could prevent the emergency services responding quickly, or even report pot holes”, said Summoogum. He concluded stating that successful Smart Cities are those who have been able to put a strong emphasis on leadership and governance, culture, business model innovation and have encouraged the stakeholders in taking an active role in the creation, delivery and operations of city spaces and services in an integrated manner. For more information, please visit: www.eyevis.co.uk sst

122

“Many would agree that the verticals such as digital technologies, data exchange between systems, IOT, etc. are merely support mechanisms that have been around in the industry for a while but the real differentiator is how effective an authority is in making innovative, or should we say ‘smart’ use of these tools to optimise the use of their resources, reducing cost and more importantly connect and empower their citizens and stakeholders.” - Kelvin Summoogum, Studio Associate of IBI Top of FormBottom of FormTop of FormBottom of Form

Security Solutions Today • September / October 2017


ALL ABOUT IOT & CYBER SECURITY

Excerpts from IoT Security By: Š 2017 Ericsson AB

Protecting the Networked Society The Internet of Things (IoT) is expanding rapidly and is expected to comprise 18 billion connected devices by 2022, but the assumptions of trust which formed the backdrop to the early development of the internet no longer apply in the early stages of IoT development. Privacy and security concerns are ever increasing, especially given the growing significance of IoT in corporate, government and critical infrastructure contexts. Likewise, the commodification of IoT components incorporated across diverse product ranges and deployed in both managed and unmanaged use cases brings significant security challenges and creates potential for novel types of attack. The proactive cooperation of all key stakeholders will be necessary to realise the considerable economic benefits of the IoT, while protecting security, safety, and privacy. The Internet of Things (IoT) is rapidly emerging as the manifestation of the Networked Society vision: where everything that benefits from a connection is connected. Yet this far-reaching transformation is only

just beginning, and the number of connected IoT devices is expected to grow by 21 percent annually, rising to 18 billion between 2016 and 2022. The IoT consists of multiple ecosystems, each with different requirements and capabilities. At one end of the spectrum, there are constrained sensors made of printed electronics; at the other end, autonomous vehicles such as trucks, trains, and aircraft. In addition, usage scenarios range from temperature monitoring to mission-critical industrial control systems. The internet began in an environment of mutual trust, where everyone could read, change, or inject information. But the IoT is taking off in a hostile environment, where the expectations of the general public and governments regarding security and privacy are very high, and information security is a top concern among enterprises adopting IoT. The IoT therefore needs to be secure from the start, protecting personal information, company secrets, and critical infrastructure. Regulators need to walk a fine line between protecting privacy, safeguarding national security, stimulating

continue on page 124

September / October 2017 • Security Solutions Today

123


ALL ABOUT IOT & CYBER SECURITY

“The IoT brings a new set of issues, such as the security, safety, and robustness of cyber-physical systems. Novel types of attack, as well as new privacy and cybersecurity regulations, may take many industries by surprise.” economic growth and benefiting society as a whole. The IoT brings a new set of issues, such as the security, safety, and robustness of cyber-physical systems. Novel types of attack, as well as new privacy and cybersecurity regulations, may take many industries by surprise. Yet the economic benefits of the IoT as an enabler for analytics, automation, and process and resource optimisation cannot be overstated. To succeed with the transformation that the IoT brings about, industries need to gather competence and understand new threats and how to mitigate them.

Cybersecurity for Billions of Devices For the IT department, the IoT will create a need to manage large numbers of different types of devices, many of which may not be able to ask a user for login credentials or run traditional security software. For hackers, the sheer quantity and diversity of these devices will increase the potential attack surface. Gartner estimates that by 2020, more than 25 percent of all enterprise attackers will make use of the IoT.The challenge of preventing attacks will be compounded by IoT deployments in settings where there is an absence of technical expertise, such as homes and small enterprises. From an operational technology perspective, the Industrial IoT (IIoT) makes industrial control systems more autonomous and connected. Cyber-physical systems affect the physical world and, when compromised, significant material damage may be caused, safety may be jeopardised, and the environment may be harmed. Hence a successful attack on an IioT system has the potential to be as serious as the worst industrial accidents to date. Hacking attacks are increasingly carried out by professionals with extensive resources and a high level of technical knowledge, and since the IoT affects people’s daily lives and industrial operations, there will be plenty of incentives to hack IoT systems. Many current IoT devices are extremely easy to hack, and the IoT has quickly become a popular enabler for massive

Distributed Denial of Service (DDoS) attacks.Mitigating DDoS is problematic as neither the owners nor the sellers of the devices bear the costs of the attacks, and IoT-based DDoS has the potential to become a major problem for society. Therefore, critical infrastructure must not only be able to withstand direct hacking, it must also be resilient to attacks such as DDoS and jamming.

Privacy and Information Security in the IoT Privacy is understood and regulated in different ways across countries and jurisdictions. The media attention on privacy has raised public awareness and a global customer survey shows that privacy is the main IoT concern. Even seemingly harmless data relating to electricity consumption or room temperature, for example, may reveal too much about a person’s habits but with billions of sensors everywhere, the IoT will drastically increase the amount of potentially sensitive information being generated concerning people’s movements, activities, and health. Compounding the problem, in most cases, people will not be aware of the sensors around them, or how the combined data from various sources can be misused. The wealth of information in clouds and devices sometimes in exposed locations increases the risks of industrial espionage and the surveillance and tracking of people. In the IoT, individual pieces of information may not reveal much, but the magnitude of data could make it possible to determine company processes through the use of analytics. Even if traffic is encrypted, meaningful patterns may be revealed through the analysis of that traffic.

Device Security and Software Update Today’s users expect security and privacy even of the smallest devices. However, a high level of tamper resistance may conflict with a desire to keep device costs down. Limited processors, small amounts of memory, and low throughput radio make some existing security protocols less than optimal for many devices. Any device continue on page 124

124

Security Solutions Today • September / October 2017


ALL ABOUT IOT & CYBER SECURITY

running on batteries has yet another limitation as every micro ampere-hour needs to be rationed to prolong the device’s lifetime.Many IoT devices will have a long lifetime and, as manual configuration is expensive, overthe-air firmware and software updates become crucial. However, ensuring robust and non-fatal updates when there is not enough memory to save both the old and new firmware is still a challenge. Another challenge is how to enforce remote firmware updates when the operating system and applications are infected by viruses attempting to block these updates.

The Implications of Regulation As the IoT affects a range of diverse sectors such as agriculture, transportation, utilities, and healthcare, many IoT systems are governed by various regulatory frameworks in each country and in some cases, such as autonomous vehicles, completely new regulations are required. The regulatory focus on security and privacy has intensified in recent years. The US Government, for example, has enforced secure management of radio parameters and fined companies for using default passwords, and the EU has reformed its regulations on the protection of personal data. Several countries have published directives on cybersecurity and protection of critical infrastructure, some have even pushed for substitution of foreign technology suppliers with domestic ones. So far, regulators have taken a heavyhanded approach to privacy, but a light-handed approach to the IoT and cyber-security. But since society will depend more on the trustworthy functioning of the IoT, regulators will most likely increase its regulation.

Defending Cyber-Physical Systems In autonomous cyber-physical systems, integrity and availability become more important than confidentiality. Losing control of locks, vehicles, or medical equipment

“The wealth of information in clouds and devices sometimes in exposed locations increases the risks of industrial espionage and the surveillance and tracking of people. In the IoT, individual pieces of information may not reveal much, but the magnitude of data could make it possible to determine company processes through the use of analytics.”

is far worse than having someone eavesdrop on them. Therefore, properties like message freshness, proximity and channel binding also become essential, sometimes in unexpected ways. As a current example, consider the proximity-based security systems used in smart car keys, access cards, and contactless payment systems. While those systems all verify freshness, they do not verify proximity, so two attackers can relatively easily relay the signal from a device in a victim’s pocket, gaining access to office buildings, opening and starting cars, or transferring money.Unless the security, safety, and privacy properties of IoT systems are carefully evaluated, suppliers may get some embarrassing and costly surprises. While most activity today takes place in the devices and connectivity phases, most future revenue is expected to come from platforms, applications, and services. In the following sections we discuss the various approaches to security during the different phases in the IoT value chain.

Protecting the Platform – A Castle In the Clouds IoT platforms need to ensure the security of data and control commands, and provide strong isolation between different devices and users, as well as between thirdparty applications and platform services. According to Gartner, security and privacy concerns continue to be the main inhibitors to cloud adoption. IoT platforms need to provide flexible key management, allowing customers to decide on the tradeoff between information security and ease of use, from managing their own keys to letting the platform provider generate and store the keys. Additionally, one of the main goals of an IoT platform is to minimize manual handling. Management functions should, for example, be able to restore devices with malware infections without the physical presence of a service technician. IoT platforms should supervise devices’ lifecycles from manufacture to decommission: During manufacturing, each device should have credentials (keys and identifiers) stored in a secure hardware module, application processor, or baseband processor. In the installation phase, the device uses the preconfigured credentials to automatically bootstrap itself to services. The IoT platform should perform initial configuration, including update of firmware, configuration of applications, and provisioning of credentials for application layer services. During operation, the platform should monitor the device, provide software updates and enforce security policies such as authorisation and access control. To save continue on page 126

September / October 2017 • Security Solutions Today

125


ALL ABOUT IOT & CYBER SECURITY

This includes actions so that IoT devices have enough security not to be enablers for massive DDoS attacks. Due to the complexity of IoT systems, new types of threats, and increasing regulation, there is a growing need for professional security services, including end system and application security verification and more commonly an industry-driven methodology to have a solid approach to assuring security for IoT-based services and platforms.

bandwidth and storage, firmware and software updates should be delta encoded. Before the device is taken out of service, the IoT platform should remotely erase all the sensitive data on it. Remote decommissioning is almost as important as remote provisioning, and should be a requirement for IoT devices.

Security, Safety and Privacy by Design A legitimate expectation of society is that IoT technologies and services will be designed with security and privacy in mind. To meet this expectation, a common effort is required, including industry, regulators, and standardisation organisations. Privacy controls should allow flexible management of identities and private data across IoT devices, networks, and services. To provide security and privacy at a low cost, the IoT needs standardization in several steps: first, common enablers, such as IETF and 3GPP, that work in a multitude of different verticals and second, specific standardisation for each vertical, such as the Industrial Internet Consortium. The IoT must be allowed to

126

“The opportunity cost of not doing enough about IoT security, safety, and privacy is very significant, due to the potential harm caused to people and property, public distrust, administrative sanctions, and even threats to national interest.� flourish without being hampered by restrictive or inflexible regulations. Premature regulation may miss the target and move investments to other regions of the world. Regulators should adopt a market-driven approach that encourages growth. Policy makers should focus their efforts on developing appropriate policy tools to identify, respond and ultimately prevent cyber-threats to IoT systems related to utilities and critical infrastructure, including autonomous systems such as transportation and manufacturing.

Security Solutions Today • September / October 2017

The widespread use of IoT creates new challenges, and its unprecedented interaction with the physical world impacts the safety and privacy of individuals. The right to privacy needs to be protected on the device, during communications, and in the cloud. As a rule of thumb, information should be transferred and accessed on a need-to-know and need-to-change basis and events such as data creation, data access, and control commands should be logged in a verifiable way. In general, IoT security and privacy are high on the agenda for the general public, media, enterprises, governments, and ICT companies. Security is a major concern among enterprises adopting IoT and cloud solutions, with Gartner expecting IoT security spending to grow by almost 60 percent in the next two years, reaching around USD 547 million. The opportunity cost of not doing enough about IoT security, safety, and privacy is very significant, due to the potential harm caused to people and property, public distrust, administrative sanctions, and even threats to national interest. For societies and economies to realise the positive benefits of the IoT, all key stakeholders need to proactively consider security, safety, and privacy throughout the entire IoT supply chain. To succeed, a mix of vendor responsibility, regulation and certification is needed. For more information, please visit: www.ericsson.com sst


ALL ABOUT IOT & CYBER SECURITY

How Organisations Can Block the Increasingly Complex Ransomware Threats By: © 1998-2017 Ixia

I

xia, a leading provider of network testing, visibility, and security solutions, offers organisations three core principles to develop an appropriate resistance against increasingly complex ransomware threats. Ransomware has become the hacker’s favorite tool to make money in the cybercrime economy. The latest Verizon Data Breach Investigations Report  (DBIR) states that it is the most common type of crimeware, as holding files for ransom is fast, low risk, and easily monetisable, especially with Bitcoin to collect anonymous payment. Attacks targeting businesses have grown by 300 percent  since January 2016, and an attack happens approximately every 40 seconds. The latest global ransomware attack appears to be a complex attack based on several ransomware families as well as multiple vectors. It has affected companies worldwide including utilities and oil companies, shipping companies and airlines, and financial institutions across Europe. All this points to the clear fact that organisations need  to protect themselves from future breaches by implementing preventive measures now. The methods of ransomware delivery have evolved as criminals look to increase infection rates and grow their illegal revenues. The early conventional methods of delivery, such as an infected file attached to an email, could be detected

and blocked relatively easily by antivirus products and security sandboxes. Today’s increasingly complex infections are specifically designed to bypass these traditional defenses. “Cybercriminals can easily mutate and adapt the ransomware code just enough so that it isn’t detected by the signature banks of antivirus software and easily avoids detection,” said Steve McGregory, Senior Director of Application Threat Intelligence at Ixia. “Once identified, r a n s o m w a r e signatures can be updated and rolled out so that antivirus products will block the new variant, although this could take days. During this time, organisations are still vulnerable, and cybercriminals often continue to exploit this to their advantage.” McGregory also stated, “Cyberattacks are increasingly complex. For example, there’s a fair bit of speculation as to the source of today’s attack and how it works. It appears to be a targeted and coordinated attack using multiple ransomware families and multiple vectors. This has enabled the attack to avoid detection and to be difficult to replicate for researchers. We are in that vulnerable time, early in the discovery phase of the attack.” According to Ixia, there are three core principles that continue on page 128

September / October 2017 • Security Solutions Today

127


ALL ABOUT IOT & CYBER SECURITY

organisations need to be aware of, if they are to develop an appropriate resistance against ransomware:

1. Discover the Origin The ransomware infection chain invariably starts with a targeted phishing email, with an attached document. The document will contain a macro, small enough to appear innocuous even to sandboxing technologies. When the document is opened, the macro activates and connects to the attacker’s remote server on the internet, and starts downloading the ransomware payload onto the machine. The macro also rewrites the payload as it downloads, so the content appears harmless until it actually enters the host machine.

2. Understanding its Behavior

Focusing ransomware protection on the content being sent to the organisation is a losing battle. Email-based macros are unlikely to be picked up, even by advanced virtualised sandboxing, because they do not exhibit maliciouslooking behavior when examined. The payload will not appear malicious until it is actually on the machine and starts encrypting, so organisations should look at the vital clues of where the infection is coming from, rather than just at what it is.

3. Blocking the Infection Most payloads in the final stage of ransomware infection are delivered from known, malicious IP addresses on the internet. As IP addresses are relatively scarce, the same ‘bad’ ones tend to be continually re-used. Even brand-new malware variants can usually be linked to a small number of compromised IP addresses. This means that if a machine in an organisation’s network attempts to download content from a known malicious IP address, they are

128

“Once identified, ransomware signatures can be updated and rolled out so that antivirus products will block the new variant, although this could take days. During this time, organisations are still vulnerable, and cybercriminals often continue to exploit this to their advantage.” - Steve McGregory, Senior Director of Application Threat Intelligence at Ixia

usually in the initial stages of a ransomware attack, and there’s no need to examine the macro that is attempting the download, or the content being downloaded. The simplest, most cost effective way to avoid attacks is to automatically block all corporate connections to known malicious IP addresses using a continuously-updated threat intelligence feed. This lets it nullify all new attacks, as well as existing, dormant infections. McGregory concluded, “Today’s attack makes it clear that organizations cannot turn a blind eye to ransomware. If the organisation has not backed up critical data, which exclusively resides on the systems affected by an attack, the costs could be considerable, both monetarily and to their reputation. Loss of customer data, financial records, and any other irreplaceable information could render an organisation unable to transact business and potentially leave permanent gaps in records.” For more information, please visit: www.ixiacom.com sst

Security Solutions Today • September / October 2017


ALL ABOUT IOT & CYBER SECURITY

Security of the Internet of Things in the Home By: Matt Lewis

B

y now we’re pretty familiar with the term ‘Internet of Things’ (IoT) and can’t escape its prevalence within technology and even mainstream news. There are various estimates on the projected growth of IoT devices over the coming years, with Gartner suggesting there will be a possible 25 billion devices by 2020.Many of these will be in our homes, performing a myriad of different functions aimed at automating, enhancing or rendering more efficient aspects of our daily lives. In this article, we set out the current state of play with regards to IoT in the home, looking at the current security threats and touching on real-world examples to show how and where things can go wrong. More importantly, we look at emerging standards and best practices in this sector and how these might help improve the security of IoT in the

home. We finish with pragmatic advice for IoT home device manufacturers on what they can and should do to maximise security assurance in their products.

IoT in the Home – Potential Threats Depending on the IoT device, the nature of what it does and the information that it processes, there are a number of different potential threats to the home and its occupants.

Threats to Privacy Many devices designed for use in the home collect and process data, often in the cloud. Depending on the nature of data captured and how it is processed, there could be serious privacy implications. Smart TVs and toys that capture

human speech for some sort of control or interaction with the underlying device – Internetconnected TVs were deemed to be breaching consumer privacy rights by recording private conversations without consent. Similarly, some toy manufacturers might also be in breach of privacy laws due to their recording, processing and possible storage of children’s conversations. Terms of Use - Many IoT home devices require initial registration of an account by the end-user, and acceptance of some sort of End User License Agreement (EULA). Often these EULAs are long and in small print and not scrutinised by the consumer before acceptance, yet in many cases they set out the possible personal nature of data that their devices and systems intend to collect, process and store. Health monitoring and tracking devices – While not strictly for the home, many IoT health tracking

continue on page 130

September / October 2017 • Security Solutions Today

129


ALL ABOUT IOT & CYBER SECURITY

devices record health data and GPS location if used as part of exercise regimessuch as fitness trackers. Any exposure of an individual’s GPS location could have privacy implications for that individual IoT home image/ video recording devices such as CCTV cameras –There is a real-world example of where a simple plug-and-play home CCTV Internet-connected camera was actually part of a global P2P network, while the P2P functionality couldn’t be disabled. The potential privacy impacts with devices that work in this way are huge where imagery/ video of people’s private, personal space is concerned.

Manufacturers often need to be quick to market Security is often an afterthought and so when timescales are tight, products are commonly released having undergone little to no security assurance testing. Ease of use – Many IoT home devices lack the luxury of a full screen and keyboard interface for interaction, requiring intuitive use of minimal buttons or actions for operation. Embedding security into such restricted interfaces can be difficult and is often seen as a barrier to ease-of-use, and so is commonly omitted.

Threats to Availability (of Home IoT devices and the Internet at large)

Small form factors and limited capability components – Many IoT home devices are designed to be as small as possible and often comprise components with limited The increase in IoT devices will inevitably increase our capability. For example, chipsets and memory that dependence on those devices and should we find such have weak upper limits on the strength of encryption equipment unavailable due that they can support. to security compromise, then These upper limits may not the issue of availability is very (and commonly are not) apparent. in line with current best “There are various estimates practice and are exploitable on the projected growth of We’ve seen a growing rise in through known and existing IoT devices over the coming ransomware affecting laptops vulnerabilities. and servers over the past few years, with Gartner suggesting years; it is possibly only a ‘Out of the box’ does not there will be a possible 25 matter of time before we see mean ‘secure out of the box’ similar ransomware attacks – It is not easy to ship tens billion devices by 2020. targeting IoT devices in the or hundreds of thousands Many of these will be in our home. of the same device with homes, performing a myriad unique, default passwords. If we’re truly dependent on Most IoT home devices of different functions aimed many IoT devices and have that employ some level at automating, enhancing no alternatives, are we likely of authentication tend to or rendering more efficient to pay the ransom demanded? ship with the same default A larger issue around credentials, which are often aspects of our daily lives.” availability of the Internet easily guessable and seldom at large is also relevant here. changed by the end-user. Readers may recall the Mirai If the process of changing botnet Distributed Denial of Service (DDoS) attacks at the credentials is either impossible or non-obvious the tail end of 2016 which affected many core Internet then the credentials typically remain in their default services. state, potentially exposing the underlying device to unauthorised access when connected to the Internet. Simply, the attacks were leveraging compromised access This is indeed one of the reasons why the Mirai botnet to over 100,000 IoT devices such as security cameras in grew so large and so quickly. order to overload DNS (and other website) services. Lack of, or vulnerable, secure update mechanism – If/ Since the attacks the Mirai botnet source code has also when security vulnerabilities are identified in home been released on the Internet, making it likely that future IoT devices, fixing the vulnerability and ensuring attacks in this domain will present themselves. successful update to all affected Internet-connected devices may not be an easy task. Entrusting the endWhy are IoT Home Devices Commonly user to periodically check for and install updates on Vulnerable? their myriad of IoT lightbulbs and home automation devices is not really feasible, so some level of periodic It is useful to understand the reasons for how and why automatic checking and update mechanism is required, security issues and vulnerabilities manifest themselves yet how, and when to notify the user? I.e. updating the in IoT devices intended for use in the home. Nonfirmware of a household full of Internet-connected light exhaustively these reasons include: bulbs would likely require the lights to be turned off for continue on page 131

130

Security Solutions Today • September / October 2017


ALL ABOUT IOT & CYBER SECURITY

a period of time. Should this happen automatically, or should the home occupants be somehow informed – if so, how, by email? Additionally, many firmware update functions in IoT home devices have been shown to be exploitable in ways that allow attackers to upload modified, possibly back-doored or malicious versions of the firmware. Again using connected light bulbs as an example, how might an end-user ever know that their IoT light bulb was back-doored or compromised and being used to take part in a global DDoS attack against critical Internet systems? The points above are echoed in the findings and presentations from the DEFCON 24 security conference in 2016.

will also support GDPR compliance

Some 47 new vulnerabilities affecting 23 devices from 21 manufacturers were disclosed during the IoT security talks, workshops and onsite hacking contests.

Recommended Manufacturer Actions

Despite reasons for the security issues mentioned above, there is still much that IoT home device manufacturers can do to reduce risk, improve the safety, security and availability for end-users and assure their privacy. The core recommended actions for IoT home device manufacturers are:

Engage in ‘Privacy by Design’ for IoT products designed for use in the home that process personal information. This includes performing Privacy Impact Assessments (PIAs) which are used to identify and reduce privacy risks in projects. PIAs help design more efficient and effective processes for handling personal data [9]. Such engagement

Implement a Secure Software Development Lifecycle (S-SDLC) – this essentially involves baking security into products by design, and challenging/testing/validating security assumptions and functions throughout the product lifecycle. It starts with threat modeling of a system to understand all of its data flows and potential vulnerability areas; from this model it is then possible to understand mitigations to be built into products to address the security threats identified As part of an S-SDLC and post-product release, engage in regular security testing and make sure there is an incident response plan detailing the process for handling and addressing any incoming vulnerability reports pertaining to the underlying device Adopt existing and/or develop in-house secure standards. Currently, standardisation across IoT is still in its infancy and without any mandate, intervention or incentive to engage [10], standardisation in this realm may take some time. Nevertheless, manufacturers should seek to follow secure guidelines for consistency and general best practice. All of the above will help manufacturers truly use security as a differentiator for their products and will help build consumer confidence in the security of the underlying device or ‘thing’.

For more information, please visit: www.nccgroup.trust sst

“Many IoT home devices lack the luxury of a full screen and keyboard interface for interaction, requiring intuitive use of minimal buttons or actions for operation. Embedding security into such restricted interfaces can be difficult and is often seen as a barrier to ease-of-use, and so is commonly omitted.”

September / October 2017 • Security Solutions Today

131


ALL ABOUT IOT & CYBER SECURITY

The First Building in the World that Interacts with People • • • •

Agnelli Foundation’s historic headquarters in Italy transformed into a digitally responsive building Innovative indoor positioning system from Siemens Real time adaptation of occupants needs through Internet of Things technologies Communication with the building systems via an easy-to-use smartphone app

A

gnelli Foundation in Italy has had its historic headquarters in Turin transformed into an advanced Internet of Things (IoT) office building, demonstrating how digitalisation is transforming conventional workplaces into the smart workplaces of the future. The new office featuring 3,000 m2 of coworking space was opened in mid-June. The project implemented the concept of Carlo Ratti Associati architects for the landmark site of the Agnelli Foundation: creating optimal working conditions in the building in real time through geo-localisation of people moving inside the complex. This means more efficient management of the building systems as well as greater comfort for people in terms of heating, cooling, shading, lighting, access, and space availability. “Intelligent devices generate huge amounts of data every day, every hour and every second. With the right digital tools it is possible to leverage the data and interact with the environment as never before. The concept of Carlo Ratti Associati for Agnelli Foundation is an ideal concept for us,” says Federico Golla, President and CEO of Siemens Italia. Hundreds of sensors monitor all

132

kinds of building data, including the location of the occupants but without identifying them. Sensors constantly check temperatures, CO2 concentration, and availability of meeting rooms. A three-axis indoor positioning system based on smartphones and custom tags was installed. It detects and communicates the presence of occupants and positioning data, automatically triggering the appropriate response of the building’s facilities. The indoor positioning system is integrated with Desigo CC, the building management system from Siemens which monitors climate, lighting, access control, CCTV and alarms and can be used to book meeting rooms. All these features can be adapted in real time depending on the number of people in different environments. The easy to use system has a gaming-style interface and is available through an app for people who are in the building. The app lets occupants access the building, interact with coworkers and book meeting rooms as well as personalise their preferred environmental settings. For further information on Division Building Technologies, please see www.siemens.com/ buildingtechnologies sst

Security Solutions Today • September / October 2017

“Intelligent devices generate huge amounts of data every day, every hour and every second. With the right digital tools it is possible to leverage the data and interact with the environment as never before. The concept of Carlo Ratti Associati for Agnelli Foundation is an ideal concept for us.” - Federico Golla, President and CEO of Siemens Italia.


ALL ABOUT IOT & CYBER SECURITY

Siemens Launches First Fully Integrated Digitalisation Hub in Singapore • • •

First Siemens Hub in the world to integrate multi-disciplinary digitalisation specialists from different businesses 
 Hub to support digitalisation efforts of companies in Southeast Asia’s urban infrastructure industry and healthcare sectors 
 Siemens aims to hire 300 digitalization specialists by 2022

S

iemens launched its first fully integrated Digitalisation Hub today to bring its expertise and innovations in the Internet of Things (IoT) to the Southeast Asian market. Siemens will be co-creating future digital applications with customers and partners to build a digital ecosystem. 
The launch took place simultaneously at parallel events in Singapore and at Siemens’ headquarters in Munich: Singapore’s Prime Minister, Lee Hsien Loong, and the President and CEO of

Siemens AG, Joe Kaeser, unveiled a plaque in Munich to mark the Hub’s opening, while Singapore’s Minister for Trade and Industry (Industry), S. Iswaran, and the CEO of Siemens Singapore, Armin Bruck, opened the Hub in Singapore. 
Supported by the Singapore Economic Development Board (EDB), the Hub brings together data scientists, solution architects, software engineers, system experts and domain specialists from the urban infrastructure, industrial

and healthcare sectors. These professionals will experiment, learn, develop and test-bed innovations and future-ready digital solutions that help businesses become more efficient and sustainable. 
 An integral part of the Digitalisation Hub concept is MindSphere, an open, cloud- based IoT operating system that offers data analytics, connectivity capabilities and tools for developers, applications and services. This platform helps evaluate and 
 process data to gain

“Supported by the Singapore Economic Development Board (EDB), the Hub brings together data scientists, solution architects, software engineers, system experts and domain specialists from the urban infrastructure, industrial and healthcare sectors.”

September / October 2017 • Security Solutions Today

133


ALL ABOUT IOT & CYBER SECURITY

insights and optimize asset performance for maximised productivity. “Innovations have been a vital part of Siemens’ DNA for 170 years. With this Digitalisation Hub, we’re creating synergy and an ecosystem for our teams, customers and business partners to tap into the benefits that digitalisation can bring,” said Joe Kaeser, President and CEO of Siemens AG. “Singapore is the ideal location for this Hub because of its distinctively advanced industrial and urban infrastructure development, combined with the government’s Smart Nation thrust to enable a digital economy.” EDB Chairman Dr. Beh Swan Gin said, “We are pleased that Siemens has decided to establish the Digitalisation

continue on page 135

134

Security Solutions Today • September / October 2017


ALL ABOUT IOT & CYBER SECURITY

Hub in Singapore, the first globally for Siemens that integrates the capabilities from all its business divisions. This will support the increasing opportunities for companies, government agencies and individuals to codevelop innovative digital solutions in the Industrial IoT space. The Hub will also help expand the pipeline of digital-ready talent in Singapore.” Sixty specialists from a variety of disciplines will work at the Hub at the outset. The number of digitalisation experts is expected to reach 300 by the year 2022. The key target areas for the Hub are urban infrastructure, advanced manufacturing and healthcare. To mark the launch of the Siemens Digitalisation Hub, three collaboration agreements were signed with Singapore partners. Nanyang Technological University, Singapore (NTU Singapore) will partner with Siemens to create and showcase data-driven innovations for urban infrastructure, such as innovative mobility solutions based on self-driving vehicles, and advanced data analytics for optimising the performance of green buildings. SP Group will collaborate with Siemens to build a next-generation energy management software platform for SP’s 24/7 control centers, to enable more robust planning, surveillance and predictive maintenance of Singapore’s electricity network. They will also create a multi-energy urban microgrid solution to help consumers save energy and cost.

“Innovations have been a vital part of Siemens’ DNA for 170 years. With this Digitalisation Hub, we’re creating synergy and an ecosystem for our teams, customers and business partners to tap into the benefits that digitalisation can bring.” - Joe Kaeser, President and CEO of Siemens AG

The electronics arm of Singapore Technologies Engineering Ltd, a leading technology, engineering and defense group; Singapore Technologies Electronics Limited (ST Electronics), and Siemens signed a partnership agreement to cocreate and proactively market innovative digital use cases in the field of transportation (roads, harbors, airports and mass transit). The focus is on applications and solutions for connectivity, cybersecurity, data convergence, analytics and contextualisation. These applications will use MindSphere to enable expansion into further market segments. For more information, please visit: www.siemens.com sst

September / October 2017 • Security Solutions Today

135


INSIDE LOOK | PREDICTIONS FOR 2017 IN VIDEO SURVEILLANCE

Gartner Identifies the Top Technologies for Security in 2017

G

artner, Inc. today highlighted the top technologies for information security and their implications for security organizations in 2017. Analysts presented their findings during the Gartner Security & Risk Management Summit, being held here through Thursday. In 2017, the threat level to enterprise IT continues to be at very high levels, with daily accounts in the media of large breaches and attacks. “As attackers improve their capabilities, enterprises must also improve their ability to protect access and protect from attacks,” said Neil MacDonald, Vice President, distinguished analyst and Gartner Fellow Emeritus. “Security and risk leaders must evaluate and engage with the latest technologies to protect against advanced attacks, better enable digital business transformation and embrace new computing styles such as cloud, mobile and DevOps.” The top technologies for information security are:

Cloud Workload Protection Platforms Modern data centers support workloads that run in physical machines, virtual machines (VMs), containers, private cloud infrastructure and almost always include some workloads running in one or more public cloud infrastructure as a service (IaaS) providers. Hybrid cloud workload protection platforms (CWPP) provide information security leaders with an integrated way to protect these workloads using a single management console and a single way to express security policy,

136

Security Solutions Today • September / October 2017

regardless of where the workload runs.

Remote Browser Almost all successful attacks originate from the public internet and browser-based attacks are the leading source of attacks on users. Information security architects can’t stop attacks, but can contain damage by isolating end-user internet browsing sessions from enterprise endpoints and networks. By isolating the browsing function, malware is kept off of the end-user’s system and the enterprise has significantly reduced the surface area for attack by shifting the risk of attack to the server sessions, which can be reset to a known good state on every new browsing session, tab opened or URL accessed.

Deception Deception technologies are defined by the use of deceits, decoys and/or tricks designed to thwart, or throw off, an attacker’s cognitive processes, disrupt an attacker’s automation tools, delay an attacker’s activities or detect an attack. By using deception technology behind the enterprise firewall, enterprises can better detect attackers that have penetrated their defenses with a high level of confidence in the events detected. Deception technology implementations now span multiple layers within the stack, including endpoint, network, application and data.

Endpoint Response

Detection

and

Endpoint detection and response (EDR) solutions augment traditional endpoint


PREDICTIONS FOR 2017 IN VIDEO SURVEILLANCE | INSIDE LOOK

preventative controls such as an antivirus by monitoring endpoints for indications of unusual behavior and activities indicative of malicious intent. Gartner predicts that by 2020, 80 percent of large enterprises, 25 percent of midsize organizations and 10 percent of small organisations will have invested in EDR capabilities.

Network Traffic Analysis Network traffic analysis (NTA) solutions monitor network traffic, flows, connections and objects for behaviors indicative of malicious intent. Enterprises looking for a network-based approach to identify advanced attacks that have bypassed perimeter security should consider NTA as a way to help identify, manage and triage these events.

Managed Detection and Response Managed detection and response (MDR) providers deliver services for buyers looking to improve their threat detection, incident response and continuousmonitoring capabilities, but don’t have the expertise or resources to do it on their own. Demand from the small or midsize business (SMB) and small-enterprise space has been particularly strong, as MDR services hit a ‘sweet spot’ with these organizations, due to their lack

of investment in threat detection capabilities.

Microsegmentation Once attackers have gained a foothold in enterprise systems, they typically can move unimpeded laterally (‘east/west’) to other systems. Microsegmentation is the process of implementing isolation and segmentation for security purposes within the virtual data center. Like bulkheads in a submarine, microsegmentation helps to limit the damage from a breach when it occurs. Microsegmentation has been used to describe mostly the east-west or lateral communication between servers in the same tier or zone, but it has evolved to be used now for most of communication in virtual data centers.

Software-Defined Perimeters A software-defined perimeter (SDP) defines a logical set of disparate, network-connected participants within a secure computing enclave. The resources are typically hidden from public discovery, and access is restricted via a trust broker to the specified participants of the enclave, removing the assets from public visibility and reducing the surface area for attack. Gartner predicts that through the end of 2017, at least 10 percent of enterprise organizations will leverage software-defined perimeter (SDP) technology to isolate sensitive environments.

September / October 2017 • Security Solutions Today

137


INSIDE LOOK | PREDICTIONS FOR 2017 IN VIDEO SURVEILLANCE

Cloud Access Security Brokers Cloud access security brokers (CASBs) address gaps in security resulting from the significant increase in cloud service and mobile usage. CASBs provide information security professionals with a single point of control over multiple cloud service concurrently, for any user or device. The continued and growing significance of SaaS, combined with persistent concerns about security, privacy and compliance, continues to increase the urgency for control and visibility of cloud services.

OSS Security Scanning and Software Composition Analysis for DevSecOps Information security architects must be able to automatically incorporate security controls without manual configuration throughout a DevSecOps cycle in a way that is as transparent as possible to DevOps teams and doesn’t impede DevOps agility, but fulfills legal and regulatory compliance requirements as well as manages risk. Security controls must be capable of automation within DevOps toolchains in order to enable this objective. Software composition analysis (SCA) tools specifically analyse the source code, modules, frameworks and libraries that a developer is using to identify and inventory OSS components and to identify any known security vulnerabilities or licensing issues before the application is released into production.

Container Security Containers use a shared operating system (OS) model. An attack on a vulnerability in the host OS could lead to a compromise of all containers. Containers are not inherently unsecure, but they are being deployed in an unsecure manner by developers, with little or no involvement

138

Security Solutions Today • September / October 2017

from security teams and little guidance from security architects. Traditional network and host-based security solutions are blind to containers. Container security solutions protect the entire life cycle of containers from creation into production and most of the container security solutions provide preproduction scanning combined with runtime monitoring and protection. sst


PREDICTIONS FOR 2017 IN VIDEO SURVEILLANCE | INSIDE LOOK

2017 Hot Access Control Trends FF By: Philip Verner, EMEA Sales Director of CEM Systems

“T

here are many trends and topics which will dominate the security industry this year. These include the growth of ‘smart security systems’ and ‘intelligent smart applications’ which add value beyond security, as well as the growing use of mobile credentials, wireless/offline locks and multi-modal biometrics. There will continue to be challenges within the industry such as the move from legacy technologies to a more secure smart card or an alternative form of credential, and with more and more manufacturers moving into areas that typically where not their core business, we will continue to see the adoption of more open standards and greater cross industry co-operation.”

Smart Buildings and Smart Intelligent Security There is a lot of talk in the industry about the rise in ‘smart buildings’ and ‘smart security systems’, but what does this actually mean? With the incorporation of information technology and the Internet of

Things (IoT), it basically means businesses are getting smarter in everything they deploy. Going beyond the physical security realm, the access control system needs to pay for itself and add real measurable value to businesses. This can be achieved by either reducing operational costs (by combining the use of several devices into one multifunctional unit) or by doing more by enhancing operational efficiencies (through the use of ‘intelligent smart applications’ at the door or the centralised command and control of integrated systems). From a security viewpoint, the access control system and integrated sub systems such as video, fire, intrusion, etc. need to work smarter for the user, with systems accurately sharing information and data to optimise total building performance. A recent example of a CEM Systems ‘smart building’ deployment is the new iconic ‘One Albert Quay’ project in Cork, Ireland. Renowned as ‘Ireland’s smartest building’,

One Albert Quay has all its critical systems including lighting, heating, power, access control, video, fire detection and fire suppression all connected to enable the smart use of data. As the industry moves more towards preventative security measures, the role of systems integration and the unified gathering of analytics from building ‘data’ becomes even more profound.

Intelligent Smart Applications Very often the access control system is seen as a ‘grudge’ purchase. To help change this mind-set and to enable the access control system to help pay for itself, CEM Systems has a range of intelligent security products that add business value. This includes the emerald multifunctional access terminal which effectively takes the functionality of numerous security devices and combines them into one powerful terminal. As an intelligent touch-screen card reader and door controller in one, emerald features an internal database, scramble

September / October 2017 • Security Solutions Today

139


INSIDE LOOK | PREDICTIONS FOR 2017 IN VIDEO SURVEILLANCE

keypad, integrated Voice over IP intercom and the highest level of built-in smart card technology. However, as an intelligent edge device, emerald goes beyond primary access control functions. Using a range of ‘smart applications’ directly on the emerald terminal, users can perform what was historically client PC application functionality right at the door, without the need to install dedicated PC software and licenses. Smart applications include among other things a ‘Local Access’ app for locally changing cardholder privileges directly on the terminal, an integrated staff ‘Time & Attendance’ app, a building ‘Entry/Exit Checklist’ app where card holders have to answer pre-defined questions before access is granted and a meeting ‘Room Booking’ app. The unique emerald ‘Room Booking’ app eliminates the requirement for a separate room booking solution from the access control system. Here users can easily create and edit meeting room bookings through their Microsoft Outlook® exchange calendar or directly on the emerald terminal at the door. This provides a smart, quick and convenient way to ensure efficient meeting room allocation. “It’s also important to remember that a smart solution doesn’t always have to be a smart app”. Harland & Wolff’s engineering facilities in Northern Ireland recently deployed CEM Systems S3040 portable hand-held card readers at dry dock areas to successfully enable people counting and “mustering on the fly” in emergency situations. This created measurable efficiency gains for Harland and Wolff by successfully bringing their evacuation drill mustering time down from 45 minutes to nine minutes.

Smart Cards and Credentials The move away from legacy technologies to using Smart cards is still a challenge in the industry today. CEM Systems will continue to work with customers throughout 2017 to smoothly migrate them from unsecure technologies (such as 125 kHz, Proximity and early MIFARE smart card technologies), to a more secure smart card technology with encrypted algorithms (like DESFire EV2). However, every project

140

Security Solutions Today • September / October 2017

has its challenges. The challenges that small companies face when implementing smart cards are cost and knowledge about the technology. Larger companies will have additional concerns such as how they physically manage the migration process and roll out of the new smart cards; especially when multiple sites and multiple security systems are deployed globally. There is also the overall challenge of new technology compatibility with customers’ existing systems and the critical decision of whether to opt for pre-personalised smart cards versus customer personalisation on site.

Mobile Credentials Another growing trend in the industry and an example of how access control systems are getting smarter for users is the use of mobile phone credentials. Using smartphones as a form of credential is a viable option and can be used either as a supplement or a complete replacement for an ID card. After all “Some people forget their ID card, but no one forgets their phone”. The benefit of the mobile credential is that it saves time and the cost of physically sending out an ID card, making it an ideal solution for businesses with remote workers and numerous remote sites. Obtaining a card from one central location can be a hindrance as it’s often a distance away. Rather than users having to visit the ID unit to obtain a card they simply download an app via the iOS® or Android™ platform store and the credential is swiftly sent to their smartphone and enabled via email.

Frictionless Access Control Versus Multi-Modal Biometrics In a perfect world the ultimate goal is ‘frictionless access control’ where the door is smart enough to know that you are the right person going through the door without an ID having to be presented. Although technology continues to progress to support non-credential access control for obvious reasons, we are not there yet. The use of wearable technology such as the smart watch is a growing trend, but there are limitations with the practicalities of its use, as required NFC (Near Field


PREDICTIONS FOR 2017 IN VIDEO SURVEILLANCE | INSIDE LOOK

Communication) capabilities, etc. are not deployed in most watches. To ensure the highest possible level of security and in light of the growing vulnerabilities of card cloning, biometric deployments are continuing to grow. The biometric industry is exploding in terms of reliability and availability of sophisticated products, with many now becoming technically and financially viable. Speech and voice recognition without an ID card is gaining popularity, along with facial recognition. However, biometrics does have its limitations in certain environments. For example, within airports there are many light areas and shadows where the accuracy and quality of the facial read can be greatly affected and reduced. To overcome biometric reliability challenges within the industry in general, we are now seeing the growing deployment of ‘multimodal (dual) biometrics’ as a more sophisticated and reliable biometric option. To ensure higher levels of reliability, 2017 will continue to see dual biometric checks like Iris & Face or Fingerprint & Vein being deployed at the same time. The combination of the two biometric options gives users a much more superior read and the fusion of these two technologies provides low failure to enrol rates. CEM Systems also continues to overcome challenges in a number of ways. In addition to having our own fully integrated access control and biometric enrolment solution, we have partnered with third party biometric providers such as Safran Morpho to develop high level integration of Finger & Vein readers at the software enrolment level. Here MorphoAccess® biometric enrolment is seamlessly integrated into the AC2000 access control

system software. This integrated process means a quicker biometric read time, less errors at the door and ultimately less lines of throughput traffic/queues at access control points.

increasingly complex with more and more suppliers now proliferating disparate areas outside of their core business. For example, with the release of the emerald access terminal, CEM Systems is now operating in areas outside of access control such as the intercom and room booking space. As manufacturers continue to supply and integrate with third party products from third party partners, the importance of cross industry co-operation becomes even greater. However, it does represent challenges for suppliers. 2017 will continue to see industry player’s work together to tackle integration software challenges such as maintaining backward compatibility of integrated systems.

Wireless / Offline Locks More and more businesses are securing doors via a hybrid approach; with high security doors installed with intelligent card readers and typically less secure areas (that perhaps wouldn’t have been secured), now fitted with wireless locks. The wireless/ offline locks trend will indeed continue to grow throughout 2017 as we see its installation into areas such as server room racks and cabinets. With wireless locks data and analytics fully integrated into the access system for central monitoring and reporting, customers have a comprehensive and powerful platform that not only enables the smart gathering of data but supports the growing trend towards smart buildings.

Industry Partnerships and Cross Industry Co-Operation The security industry is becoming

We must also ensure that products support industry standards and open protocols, such as the recent Open Supervised Device Protocol’ (OSDP), which was introduced as an open protocol to replace unsecure Wiegand communication between the card reader and door controller.

Conclusion As technology continues to progress this year it will be interesting to see by the end of 2017 where we are with regards to pure frictionless access control, as well as the measurable operational gains being reported from smart buildings. It is also likely that more and more industry standards will be introduced. On a personal level, I will be keeping an interested eye on robotics and how that evolves into the security industry; but that trend is for another day. For more information, please visit: www.cemsys.com sst

September / October 2017 • Security Solutions Today

141


IN FOCUS | AN INTERVIEW WITH HUAWEI ON SECURING FUTURE SMART CITIES

HUAWEI

ON SECURING FUTURE SMART CITIES

In the near future, will robotics and connected devices/ systems replace human beings completely? An example would be security robots in place of security guards. Could we soon see the day when we will have to rely completely on technology? What will be the implications of this? The nature of threats to public safety varies enormously from organized crime and terrorism to accidents and natural disasters. Protecting the public against safety threats requires considerable intelligence, experience and intuition of frontline public safety officers. In addition, there are great differences between how different public safety authorities are structured and organised, and how they respond to threats from the policy level to the operating procedures adopted in each case. For these reasons robotics, connected devices/ systems, AI and Machine Learning will not completely replace humans in ensuring public safety. Instead, technology will complement human activities where these activities have routine processes, can be readily automated, require big data analytics, come with high risks to humans or are beyond a human’s capability. Public safety typically involves four core stages of threat management - Prevention, Detection, Response and Recovery. Let me give some examples of tasks appropriate for robotics and connected devices/ systems within the first three phases. Prevention
Robotics can assist in public safety routine

142

Security Solutions Today • September / October 2017

patrols by using analytics technology to recognise and assess faces, number plates, behaviours, and events. Drones can also be used for mid-air patrolling particularly in builtup cities,which often have ‘blind zones’. In addition, vehicles carrying hazardous materials can be used by criminals as weapons or can cause serious threats to the public if they are involved in an accident. By using connected devices and systems together with advanced analytics, public safety officers can disable the vehicle’s engine if it is going off course to prevent a potential catastrophe. Likewise, Connected and Autonomous Vehicles (CAVs) can be monitored and managed to ensure safer roads. Detection
Robotics, drones and connected devices/ systems can help detect threats. However, better sensory and big data analytics are needed to improve the reliability of such automatic detection of threats to avoid inappropriate responses, for example where a threat is found but not real.
The European Union’s eCall 112 project is a good example of how connected vehicles can automatically dial the emergency center to report an accident. AI can also be used to screen emergency calls (999, 911, 112, etc.) and help public safety teams prioritise real emergency calls ahead of non-emergency, prank or repeat calls. Advanced technology also enables traditional call- taking systems to support mobile app reporting, such as from a hostage during an armed siege, and sensor reporting such as eCall 112. With greater use of social media particularly among younger generations, Machine Learning will be important to detect emergencies reported through social networking rather than traditional channels.


AN INTERVIEW WITH HUAWEI ON SECURING FUTURE SMART CITIES | IN FOCUS

Response
Once a threat/emergency is detected, the next crucial step is to respond and deploy the necessary resources. While AI can automatically dispatch the appropriate responders, it is critical for human supervisors to monitor these automated responses as routine situations can quickly escalate requiring further action. AI complements existing protocol systems supporting public safety team decisions on further causes of actions, such as dispatching specialised units, reporting to higher levels of government, and issuing public warnings. In the response phase, big data analytics can be used to conduct simulations, from crowd behaviour to evolving disaster threats, for more precise responses that save lives and properties. Robotics and drones will also have a major role in this phase especially if the situation is too dangerous for public safety officers, such as bomb/CBRN disposal and neutralising other high risk threats. While the application of technology to Prevention, Detection, Response and Recovery is possible in the near future through the use of Huawei’s Collaborative Public Safety, C-C4ISR, solutions, we need to consider these important implications: • Connection and convergence of systems, devices, robotics, and drones
 • Big Data related technologies, and scenario-based data modeling to drive AI and 
 Machine Learning • Privacy and legal framework on the use of such technologies, and real-time access to 
nongovernment data, such as social networking 
 • Legal and ethical considerations if robots are allowed to use force on a human posing an 
eminent threat to others

With the rising influx of connected devices comes major security risks. Cyber attacks have been carried out on everything from water plants to oil refineries. How can these incidents be prevented/anticipated by smart cities? This is a critical concern. In addition to thwarting sophisticated attacks on utilities, we also need measures to prevent adversaries remotely hacking and

controlling connected cars with potentially disastrous consequences. Greater connectivity also means increased vulnerability across entire systems and it has become more challenging to reduce the risk of attacks, particularly from insiders or through social engineering. Protecting our critical networks and businesses from cyber-attacks in a well-connected environment cannot be an afterthought; we need layers of security working seamlessly with each other. For example, Huawei helps our customers to secure their devices/ IoT, networking (both wired and wireless), and cloud/data centre. Our Unified Security solution not only integrates and protects this entire system, but also provides early detection and warnings, even against day zero attacks and insider threats. 


Security is transcending the physical realm and moving towards the cyber domains. This means the impact of security breaches is now felt globally. How can governments and the private sector collaborate to address these threats? 


While many governments and companies have made improvements in cybersecurity over the last few years, they are not keeping pace with the growing sophistication of motivated cyber attackers. In fact we are now no longer dealing solely with traditional cybercrime, we also need to tackle cyber-enabled crime.

September / October 2017 • Security Solutions Today

143


IN FOCUS | AN INTERVIEW WITH HUAWEI ON SECURING FUTURE SMART CITIES

systems. Huawei 
participates in international cyber security initiatives and standards work through our membership in key organisations.

Please share with us on how Huawei is assisting law enforcement as well as security companies in dealing with terrorist attacks, which seem to be a common occurrence in today’s world. 
 It is important to emphasise that Huawei develops technological solutions to enable all types of public safety agencies to ensure public safety against all threats, including organised crime, accidents, natural disasters, terrorism, etc. We do not design our solutions specifically to help law enforcement agencies deal with terrorist attacks. 
 Huawei’s solutions are designed not only to address the existing public safety landscape, they also meet the demands of an evolving digital environment. The bad guys are leveraging technologies such as social networking, mobile computing, cloud and even Big Data. For example, a terrorist cell today is not limited by geographical constraints; it adopts a platform to widen its ecosystem of likeminded terrorists across the world.

INTERPOL distinguishes between these two areas as: Cybercrime – Sophisticated attacks, or high-tech crimes, such as hacking, malware attacks, DDOS, and ransomware. 
 Cyber-enabled crime – traditional crimes which are facilitated by technology, such as theft, fraud, child exploitation, and even terrorism. 
The bad guys are constantly evolving and adapting their technologies and methods. Attacks may appear sporadic and not related but they may be part of a bigger illicit campaign. Therefore it is crucial for governments, private sector, non-profit, academia, and even individuals to collaborate to counter such threats.

144

People with ill-intent can spread rumours and incite violence during mass protests through the use of meshnetworking, such as Firechat. We are even seeing CyberAttack-as-a-Service, such as those services offered by Lizard Squad. 
To stay ahead of criminals who are using digital for illegal activities, public safety agencies need to transform and embrace Collaborative Public Safety, which comprises: • Inter-agency collaboration 
 • Communities collaboration 
 • Digital platform to enable collaboration 
To enable Collaborative Public Safety, Huawei designed its Collaborative C4ISR, or C-C4ISR solutions: 
 • Collaborative Command and Control 
 • Collaborative Communication 
 • Collaborative Cloud computing 
 • Collaborative Intelligence 
 • Collaborative Surveillance 
 • Collaborative Reconnaissance 


It takes a network to fight a network. 
Such collaboration usually involves sharing real-time information, advanced analytics, coordinated responses, evidence collection, public education and R&D to enhance security technologies. This can help drive a robust legal framework and privacy policies, as well as build trust between various entities.

These solutions support collaboration across the core threat management phases of Prevention, Detection, Response and Recovery. 


Typically there is a Cross-Agency Cyber Security Operations Centre at the heart of this collaboration, integrating agencies, technology, and information

Huawei’s Collaborative Public Safety, C-C4ISR, solutions is ahead in the market due to the following attributes:

Security Solutions Today • September / October 2017

What edge does Huawei have over its competitors in terms of smart security solutions for smart cities? 



AN INTERVIEW WITH HUAWEI ON SECURING FUTURE SMART CITIES | IN FOCUS

• • • • •

Addresses existing and emerging public safety agency requirements; 
 Enables public safety agencies to drive digital transformation; 
 Supports the full public safety cycle including Prevention, Detection, Response and 
Recovery; 
 Follows various industry ICT standards; 
 Integrates with public safety applications from hundreds of leading providers worldwide; 
and 
it leverages Huawei’s 80,000 R&D engineers to include the latest innovative technologies, 
including cloud computing, big data, IoT, and broadband trunking. 


What are some upcoming technologies that we can look forward to in terms of keeping the public safe? (E.g. emotion recognition etc.) As mentioned earlier, robotics, AI and Machine Learning, are all important emerging technologies for public safety. Non-textual analytics, such as video, audio, and sensory, are also important. In addition to emotion/sentiment recognition, advanced research is taking place in gait and scene analytics. Huawei has recently opened a Video Cloud Certification and Verification Centre to test and certify various video analytics from different partners through several types of cameras, camera positions, lighting and background. R&D efforts include chipsets for in-camera analytics, image enhancement, and secure and smart IoT platforms. 
AR and VR will also transform public safety in the future. Imagine a police officer in a police car patrolling a neighbourhood. The cameras on board will pick up images of buildings, vehicles and people. With recognition analysis, the relevant information can be augmented (through AR) on the police car windscreen providing the officer with a safe and prompt way to make informed decisions. With VR, a commander doesn’t need to rush to the command center or incident site in the middle of the night. Instead he can wear his VR goggles and be immediately immersed in the virtual command center, with real-time mapping information, video surveillance and big data, enabling interaction with his staff in the center. 
Huawei is also investing in big data analytics, including the development of embedded algorithms. To mitigate silos across agencies and support hundreds of public safety applications, Huawei is developing a standards-based platform to facilitate information

exchange, and the agile deployment of applications. 
 While these are tangible and exciting upcoming technologies, the backend infrastructure technologies are often neglected but just as critical to ensure fast and reliable connectivity, especially with increasing data volumes. Technology such as Huawei SmartTrans solution addresses public safety infrastructure demands by allowing video content to be transmitted 7x faster than conventional FTP. In addition, Huawei continues to invest in R&D to help public sector agencies drive processing power in their data centers as well as essential power supply including UPS and batteries. 


Increased surveillance and connected solutions are somewhat intrusive and invade the privacy of individuals. Governments and other agencies have access to an individual’s private data from a simple scan. Is our privacy a necessary sacrifice, in your opinion and can a compromise be reached? Any privacy infringement is counterintuitive to Collaborative Public Safety, where trust between the communities and public safety is paramount. Police and the government have to protect the privacy of their constituents. Laws, policies, governance, compliance and audit trails have to be in place allowing constituents to maintain their privacy so that lawabiding citizens don’t feel afraid. 
However, to counter threats, especially cyber-enabled threats, proper judicial processes need to be in place for police/intelligence agencies to access some of these privacy-protected data sources. Strict governance and audit trails are needed to prevent and detect abuses. 
There is also a need for separation of duties, such as between a data custodian and a law enforcement agency. It is important to realise that privacy cannot be upheld without security. All the laws and policies point to the need for information and cyber security, including infrastructure security, identity management, cloud security and mobile security. As mentioned earlier, Huawei offers a comprehensive suite of such security technologies that address these areas. 
 The discussion on balance between privacy and security should continue indefinitely; it is a way of check and balance on all parties concerned. If privacy rules, the bad guys will gain an upper 
hand. If security rules, the increased level of mistrust and even abuses are counterintuitive to the fight against the bad guys. sst

September / October 2017 • Security Solutions Today

145


IN FOCUS | AN INTERVIEW WITH JONATHAN CARE

JONATHAN CARE, ANALYST AT GARTNER INC.

IN THE RECENT MONTHS, BUSINESSES THE WORLD OVER HAVE BEEN PLAGUED BY RANSOMWARE ATTACKS FROM WANNACRY TO THE RECENT PETYA. WE SIT DOWN WITH THE EXPERTS IN CYBERSECURITY ON THE IMPLICATIONS OF THESE CYBER ATTACKS AND HOW COMPANIES CAN CONFRONT THESE ISSUES EFFECTIVELY. A monumental number of businesses in Europe and the United States have been affected the Petya Ransomware Attack. Tell us more about this attack and how it compromises the data of organisations? It’s quite simple. Malware infects a client machine (laptop, workstation) or servers, and encrypts the data on those servers, making it unreadable to others. The attack appears to have originated with an infected accounting software update from a company in the Ukraine breached by an attacker, who then passed it on to their customers.

What are some preventative measures that could have been implemented by organisations beforehand to prevent or minimise the damage done? Standard users should not have permission to access administrator rights to the local computer which the malware requires. Consider restricting who has local admin rights to prevent execution of exploit code within organisations. Home users should also consider using a Standard User Account for day-to-day operations. Many Windows systems are configured to automatically reboot if it crashes. You can disable this feature in Windows. If you can prevent the MFT from being encrypted, you can still recover your data from your local disk.

In your opinion, why has there been a sudden influx of ransomware / malware attacks in

146

Security Solutions Today • September / October 2017

2017? Are hackers becoming more sophisticated or are organisations just not up to par in terms of implementing cyber security measures? A combination of both. A stash of leaked exploits has been made available on the Internet and hackers are making use of these. One such exploit is ETERNALBLUE which has been used in both Petya and WannaCry. In light of these cyber attacks, one may conclude that the digitalization of the world we live in (Smart cities, Smart homes etc.) in this connected era, is ridden with security risks or open entrances for hackers and yet there is no way to elude the shift to this IoT era. What everyday safety measures must businesses adopt so as to reduce their vulnerability to cyber attacks? Gartner recommends the use of its Continuous Adaptive Risk Trust Assessment and Adaptive Security Architecture models to enable organisations to make changes to their security posture. The most important shift in thinking is to recognise that protective controls alone are not enough. CISOs must realise that their job is no longer to be the defender of the organisation, but through use of effective detective measures, rapid incident response and effective threat and risk prediction, to ensure business survivability.

Moving forward, please share with us on why businesses should pay attention to cyber security. What are the first steps businesses can take in securing their data from cyber attacks? So much of business nowadays is digital. Money


AN INTERVIEW WITH JONATHAN CARE | IN FOCUS

transfers, critical information, sales orders and even employee records. Cyber Security is the method, processes and tools by which we secure the digital business of today. First steps: • Deploy the latest Microsoft patches, including MS17-010 which patches the SMB vulnerability • Consider disabling SMBv1 to prevent spreading of malware • Educate end-users to remain vigilant when opening attachments or clicking on links from senders they do not know • Ensure you have the latest updates installed for your anti-virus software, vendors are releasing updates to cover this exploit as samples are being analysed • Ensure you have backup copies of your files stored on local disks. Generally, user files on local drives are replicated from a network share • Prevent users from writing data outside of designated areas on the local hard disk to prevent data loss if attack occurs • Operate a least privileged access model with employees. Restrict who has local administration access

Kindly advise those who have been affected by the Petya attack on what measures they can take to save their data, prevent further damages and most importantly – what they should not do when dealing with ransomware attacks? The malware requires administrator rights to the local computer. Standard users should not have this in permission. Consider restricting who has local admin

Consider restricting who has local admin rights to prevent execution of exploit code within organisations. Home users should also consider using a Standard User Account for day-to-day operations.

rights to prevent execution of exploit code within organisations. Home users should also consider using a Standard User Account for dayto-day operations. Many Windows systems are configured to automatically reboot if it crashes. You can disable this feature in Windows. If you can prevent the MFT from being encrypted, you can still recover your data from your local disk. Unlike WannaCry, Petya is a different kind of ransomware. Common delivery methods are via phishing emails, or scams. The payload requires local administrator access.  Once executed, the system’s master boot record (MBR) is overwritten by the custom boot loader, which loads a malicious kernel containing code that starts the encryption process. Once the MBR has been altered, the malware will cause the system to crash. When the computer reboots, the malicious kernel is loaded, and a screen will appear showing a fake Check disk process. This is where the malware is encrypting the Master File Table (MFT) that is found on NTFS disk partitions, commonly found in most Windows operating systems. It is when the machine is rebooted to encrypt the MFT that the real damage is done.

In your opinion, will there be more cyber attacks in 2017 and why? Undoubtedly yes. Attackers will attack for political, social, economic and disruptive reasons. Digital business has become the new battleground and national interests as well as organised criminal gangs are participating.

How can Gartner assist businesses with their Cybersecurity needs? Also please share with us on the added edge that Gartner can provide its clients in terms of securing their data. Gartner provides actionable advice on technologies and best practices that give our clients unique insight into markets and methods which will allow expansion and growth of risk appetite while managing and ensuring that risk tolerance is not impacted. We speak with the top 10,000 companies across the globe and share our knowledge through our Research and Advisory Service. sst

September / October 2017 • Security Solutions Today

147


IN FOCUS | AN INTERVIEW WITH MR PHILIP TAYLOR

MR PHILIP TAYLOR,

THE REGIONAL SALES MANAGER OF INDUSTRIAL COMMUNICATIONS AT SIEMENS

Please share with us on your experience in the field of Cybersecurity. Cybersecurity trends are constantly evolving due to rapid industrialisation, digitalisation of industrial plants and increasing capabilities of cyber attackers. It impacts businesses across some of the largest contributors to the economy such as manufacturing, power, healthcare and more, which require high availability and reliability at all times. As part of the Industrial Security team at Siemens, we work closely with customers such as manufacturers, operators and integrators to identify their business needs, address their problems and provide the right solutions. As a technology powerhouse in the areas of electrification, automation and digitalisation, Siemens provides technical expertise, according to high security standards as well as all-rounded services for customers to ensure that industrial plants across the world have access and support to quality security solutions.

The recent Wannacry attacks impacted over 200,000 computers in 150 countries. What are some precautionary measures that could have been implemented to prevent or minimise the impact of such attacks? What damage control strategies can be implemented in the wake of the attacks? With increased usage of cloud computing and the Industry of Things (IoT), companies are constantly exchanging data and authorising personnel across

148

Security Solutions Today • September / October 2017

multiple networks so there is no such thing as 100 per cent security. To prevent internal and external cyber attacks, a comprehensive protection of industrial plants across all levels, from plant management to the field level has to be implemented. Open communication with customers and the public is crucial. At Siemens, we have the Product Computer Emergency Response Team (ProductCERT), which comprise of security experts that are available around the clock to immediately identify security vulnerabilities, report it on a dedicated website and make appropriate updates available to the customers. Security for automation (we call it Industrial Security) has become increasingly important due to digitalisation. Therefore, the key is to leverage on a holistic and integrated approach that can constantly monitor, integrate and include security mechanisms into existing plant set-ups.

Tell us more about the defense in depth concept. We have been working tirelessly to advance the digitalisation journey of the manufacturing and process industries, paving the way towards the Digital Enterprise. One of the cornerstones of the Digital Enterprise is Industrial Security, which centers on the defense in depth concept. The defense in depth concept focuses on three core elements, namely, plant security, network security and system integrity, as recommended by ISA 99/ IEC 62443 - the leading international standard for security in industrial automation.


AN INTERVIEW WITHMR PHILIP TAYLOR | IN FOCUS

In short, plant security In an effort to keep up includes proactive with current trends, Network security offers avoidance of security many businesses are protection for industrial gaps, such as providing making the shift to continuous updates, digitalisation. How communication systems comprehensive monitoring would you advise against unauthorised of plants and a transparent these businesses to go access from the Internet, view of the plant’s about this transition security status to adapt effectively and safely? which can be facilitated by quickly to cyber threats. installing a VPN to secure Network security offers Due to rapid technological networks and firewall to protection for industrial advancements and communication systems increased competition in control data exchange and against unauthorised the market, many companies unauthorised traffic, for access from the Internet, have acknowledged that which can be facilitated by example. the journey towards installing a VPN to secure digitalisation has become a networks and firewall to necessity in order to remain control data exchange and competitive. However, not unauthorised traffic, for example. Lastly, system all know where to start. integrity refers to protection of automation systems and control components against threats such as The transition towards digitalisation is an incremental unauthorised reproduction and restrict access process based on the current state of the company’s following the minimum privilege principle up to full facilities. Currently, there is a critical capability gap locking. Integrating all three of these core elements in the region, as we see that while companies are would ensure a complete and efficient security keen to digitalise their existing setups, they are not support system for today’s Digital Enterprises. equipped with the knowledge and technical expertise to do so. Hence, we at Siemens work very closely with In the age of IoT, security risks are becoming our customers to guide them in their digitalisation more prevalent due to the fact that every roadmap. First we assess the company’s individual device is connected to the internet including pain points, then we discuss potential ideas Smartphones and other gadgets of employees. with them, and ultimately provide How can organisations better protect their tailored solutions that would data from hackers. help them optimise their value chain, increasing flexibility, Companies and most importantly, their employees, shorten time-to-market can prepare for and prevent risk of downtimes due and improve efficiency to cyber attacks by adopting a proactive approach. for their business in This includes regularly updating security systems, the long run. providing high transparency in budget planning for cybersecurity solutions and having 24-hour access What are your to security experts that can work immediately as and predictions when a crisis arises. with regards to Some elements of our Siemens offerings to help organisations protect data from cyber attacks comprise

• • •

A whole set of Plant Security Services, ranging from risk assessments up to remote management of Security incident and event management in our Cyber Security Operation Centers (CSOC) Certification of automation systems (e.g. PCS7) based on 62443-3-3 And what is more, our products like SCALANCE and Ruggedcom switches and routers are developed according to “secure by design” development processes referring to IEC 62443-4-1.

cybersecurity in the remaining part of 2017? Do you anticipate any upcoming major attacks?

This year, we will continue to see investments in cybersecurity solutions as well as a heightened focus to extend the knowledge and skill sets of employees through training programs to non-IT professionals.

September / October 2017 • Security Solutions Today

149


IN FOCUS | AN INTERVIEW WITH MR PHILIP TAYLOR

Additionally, many governments in Southeast Asia are now enforcing regulations that would encourage businesses to take preventive measures against the threats of cybercrime. For example, in Singapore, cybercrime laws have been changed to keep up with the rapid evolution of cybercrime. Revisions include the amendment of the Computer Misuse and Cybersecurity Act, which impose higher penalties for hacking and require operators to be take proactive measures in securing their systems and networks. Recently in June, Singapore and Australia also signed a cooperation agreement in efforts to stem cybercrime and boost cybersecurity in the region. Australia has also signed cybercrime agreements with Thailand and China to boost commercial security.

In your opinion, is cyber readiness at an optimal level in the APAC region? What message do you wish to convey to our readers regarding the importance of Cybersecurity in present times? How can Siemens assist organisations in securing their data? Cybersecurity remains a key priority for many companies, and there is still more work that can be done to increase the resilience of businesses in the Asia Pacific region. In the current business landscape, we are seeing more manufacturing companies starting to implement digitalisation solutions, as they would bring benefits such as increased flexibility, improved productivity and shortened time-to-market of products. As well as less downtime due to remote maintenance / secure remote access. This means that there will be a rise in networked plants, enhancing industrial communications and creating multiple entry points. Hence, it is now more important than ever to enhance cybersecurity posture to protect against potential threats that could hinder the company’s competitiveness and ultimately lead to

150

Security Solutions Today • September / October 2017

In Singapore, cybercrime laws have been changed to keep up with the rapid evolution of cybercrime. fatal consequences. At Siemens, we work together with our customers across all levels and sectors to assess their current set-up, understand their individual requirements and create a holistic security concept that is tailored according to their needs. The impact and complexity of cyber attacks are constantly evolving, but so are our solutions. We ensure that our industrial security portfolio meets the industry standard and adhere to local regulations. Additionally, our team of security experts are always available around the clock to provide customers with timely and efficient support. sst


ZHEJIANG DAHUA | SPECIAL PRODUCT FEATURE

Dahua Technology Launches ePoE IP System

D

ahua Technology Co., Ltd., a leading solution provider in the global video surveillance industry, today announced the launch of a system of extended Power over Ethernet (ePoE) devices including cameras, network switches and network recorders. Dahua ePoE IP system supports up to 800 meters between the ePoE camera and the ePoE network switch or ePoE NVR with embedded switch. It overcomes the limitation of traditional Ethernet and POE (both restrict cable distances to 100 metres (328 feet) between network ports) and eliminated the need for Ethernet extension devices or additional network switches.

Product Features Dahua provides the complete solution for ePoE IP System including IP cameras, NVRs and Network switches. The system has the following features: 1. Extended PoE transmission: 800m, 10Mbps, 13W or 300m, 100Mbps, 25.4W 2. Automatic set up, plug & play 3. Perfect for analog to IP migration: IP video, audio, control & power (4 in1) over coax cable; with LR1002 ePoE to BNC adaptor

ePoE Series Network Cameras The ePoE series IP cameras will be released in July 2017. They cover resolutions from 1080P to 4K, and have rich selections of camera form factors (box, bullet, dome, eyeball) and lens types (vari-focal, fixed lens), which can meet most surveillance requirements. Besides, as a sub-category of Eco-savvy 3.0 series, they inherit all the software features of Eco-savvy 3.0 series products, such as Smart Video Detection (Tripwire, Intrusion, Abandoned/Missing detection), Face Detection and Smart H.265+ encoding. It is a good choice for installers with long-distance transmission needs. *-Z5E/Z12E lens optional for bullet and dome ns optional for bullet and dome

ePoE Series Network Recorders The ePoE series network recorders will be released in September 2017. They have 8 green ePoE ports that support long-distance PoE transmission (300m@100Mbps/800m@10Mbps/EOC0 when connecting to ePoE cameras. There are 3 models with 2/4/8 SATA ports respectively for different storage capacity. Advanced H.265 chipset is deployed to support 4K & H.265 decoding at a performance up to 16ch@1080P or 4ch@4K live view or playback. As a subcategory of Pro series NVR, it inherits all the software features of NVR5000-4KS2 series products, such as Smart Video Detection, Face Detection, Smart H.265+ decoding, ANPR, POS and custom split. It is compatible with standard Ethernet or PoE cameras and switches, perfect for migration of existing system.

September / October 2017 • Security Solutions Today

151


SPECIAL PRODUCT FEATURE | ZHEJIANG DAHUA

8 Green ePoE Ports Coming soon in the 4th quarter 2017

ePoE Series Network Switch The ePoE network switch PFL2106-4ET-96 has been released in Nov. 2016. It has 4 ePoE ports that support longdistance PoE transmission (300m@100Mbps/800m@10Mbps/EoC) when connected with ePoE cameras. It supports plug and play and no configuration required to realise long distance transmission. Additionally, ePoE series network switch adopts industrial grade design with wide operation temperature range (-30°C~+65°C) and high level lightning protection, which further save cost by eliminating the need for an equipment room. Besides, it is also compatible with the non-ePoE IP cameras (100m@100Mbps). ePoE Network Switch PFL21064ET-96

Power over Coaxial Extender LR1002

• • • •

1*10/100 Mbps Base-TX + 1*BNC RG59 coaxial cable: 400m/100 Mbps, 1000m/10 Mbps High level lightning protection -30°C~+65°C

Application of LR1002

Application Scenarios

For surveillance of large space such as big warehouse, parks, garden and outdoor parking, camera locations are dispersed and far from the control center, usually longer than 100 meters. Conventional approach is to add repeater devices to extend the transmission distance. However, this would increase cost of equipment and installation. Power supply and junction box will be required to install the repeater. It also makes it harder to maintain and increases the risk of product failure. Alternately, fiber optic transceiver for long-distance transmission is also available. However, fiber optic cable has to be installed and it requires a power supply at the camera side to power the fiber optic transceiver as well as the camera. This is quite a big problem if you have a few installation points over a large space. Dahua ePoE IP system offer a very simple and effective solution. Dahua ePoE supports up to 800 meters via the traditional Cat5 ethernet cable. It greatly simplifies the network construction as only one cable is required to connect from the frontend to the back-end devices, which results in higher reliability and lower installation and maintenance costs of the whole system.

152

Security Solutions Today • September / October 2017


ZHEJIANG DAHUA | SPECIAL PRODUCT FEATURE

For migration of analog surveillance system to IP, reusing existing coaxial cable can largely reduce the installation cost. A proper solution needs to address 3 issues: adapt the IP video signal and RJ45 connection to coaxial cable, support the length of coaxial cable as it is, transmit power over coaxial cable. Dahua ePoE IP system addresses all of them and makes it easy to reuse existing coaxial cable to run IP video. Power over Coaxial Extender LR1002 connects to Ethernet port of IP camera or network switch on the one end and connects to BNC connector of coaxial cable on the other end, Dahua ePoE IP system supports transmission up to 1,000 meters over RG59 coaxial cable at 10Mbit/s bandwidth, and delivers PoE power to the IP camera. This is a simple and effective solution that delivers seamless plug and play solution. It can significantly reduce the cost of analog to IP migration.

Traditional Mixed Networking Application

Dahua ePoE IP system solution

Summary The ePoE technology of Dahua adopts advanced 2D-PAM3 coding modulation from physical layer, and realizes full duplex transmission over 800 meters at the speed of 10Mbps, or 300 meters at the speed of 100Mbps via Cat5 or coaxial cable media. Dahua ePoE technology offer a new way to accomplish long distance transmission between IP camera and network switch. It allows more flexible surveillance system design, improves reliability and saves construction and wiring cost. For more information, please visit: www.dahuasecurity.com sst

September / October 2017 • Security Solutions Today

153


SPECIAL PRODUCT FEATURE | ZHEJIANG DAHUA

Dahua Technology Launches a Thermal Camera Truly for Commercial Market

H

angzhou, China - Night surveillance, remote surveillance, temperature detection since their debut, thermal cameras are endowed with features that other cameras cannot compete with. Debuted in military field, thermal cameras have played a key role in wars. After years of research and development, infrared image processing technology and the craftsmanship of the detectors are becoming more proven, and the cost of the components is lowering, thermal imaging technology entered into industrial market. However. till now, most of the thermal cameras in industrial market are still very bulky and above the affordable limit of most commercial projects. Dahua, as a world leading manufacturer and supplier of intelligent security surveillance products and solutions, launched an entry-level thermal mini hybrid bullet camera – DH-TPC-BF2120. Featuring mini size, dual-channel spectrum, intelligent functions and affordable price, DH-TPC-BF2120 is a thermal camera truly for commercial installations. It is installed just like any other security surveillance camera.

DH-TPC-BF2120 Product Features Mini-sized and Durable DH-TPC-BF2120 has a small and cute external dimension of 9.39” x 3.56” x 3.56”. The ingress protection grade reaches up to IP67, which has strong environmental adaptability against water, dust and other contaminants. Dual-Channel Spectrum, External Infrared Lamp DH-TPC-BF2120 deploys Dahua’s advanced image analysis and intelligent algorithms in the optical camera, and fully integrates them into the thermal camera. This camera combines one thermal camera for monitoring in total darkness and one optical camera with SONY STARVISTM sensor to acquire high resolution color image. It is connected using one IP address. IR led illuminating will be turned on at night to make sure no detail is missed in any lighting conditions. Intelligent Functions In addition to basic functions such as ROI, IVS, PIP, image fusion and etc., DH-TPC-BF2120 supports multiple intelligent functions, meeting the demand of daily video surveillance, fire hazard warning and alarm message delivery. Fires are usually caught by imperceptible hidden flames, which are hard for general surveillance systems to detect. Utilising thermal imaging technology, DH-TPC-BF2120 is able to discover hidden flames quickly and effectively. It precisely locates the fire allowing timely emergency response to nip the fire in the bud.

154

Security Solutions Today • September / October 2017


ZHEJIANG DAHUA | SPECIAL PRODUCT FEATURE

Image Fusion Application Scenario Perimeter Protection Multiple DH-TPCBF2120 thermal cameras can be utilised to form a perimeter intruder detection system, which performs as an invisible tripwire using thermal imaging technology. When installed at the recommended height of 5 meters and with an FOV of , one DH-TPCBF2120 thermal camera covers a fence of 29 meters long. Whether it is day and night, as long as someone enters into a targeted area, a warning will be sent to the control center. It is truly an ideal choice for applications such as residential parks, industrial parks, gardens and large parking lots.

Perimeter Protection

Fire Detection Big internal spaces with goods presents fire hazard which is difficult to detect by smoke sensor. Surveillance cameras, however high-resolution they are, cannot effectively detect the location and scale of the fires. Thanks to its thermal technology, DH-TPC-BF2120 is an ideal device to guard such spaces like warehouses, exhibition halls, etc.

Fire Detection

Summary Dahua DH-TPC-BF2120 thermal mini hybrid camera, a powerful combination of high cost-effectiveness and intelligent functions, is the first thermal camera truly for commercial market. Though an entry-level product in Dahua thermal camera portfolio, DH-TPC-BF2120’s numerous intelligent functions make it a one-stop solution for small and medium sized surveillance projects. Supporting ONVIF Protocol, DH-TPC-BF2120 is compatible with mainstream third-party VMS platforms in the market, such as Genetec (Security Center 5.6 GA), Milestone (XProtect Corporate 2017 R1) as well as Dahua DSS (Dahua Security Software). The launch of DH-TPC-BF2120 will increase the potential market space of thermal imaging, protecting the investment of Dahua customers. With a mission to build a Safer Society and promote Smarter Living, Dahua will continue to focus on “Innovation, Quality and Service” to serve partners and customers all around the world. sst

September / October 2017 • Security Solutions Today

155


PRODUCTS

SECURITY MANAGEMENT

ACCESS CONTROL

Model: AMR170 NFC By: Asis Technologies | i www.asis-technologies.com

Product Specifications:

• • • • • • •

• • • • •

Designed with fresh new look for a new generation of users Utilises latest Near Field Communication (NFC) technology Supports the industry standard contactless smartcard operations in compliance with ISO 14443 Type A/B, FeliCa and CEPAS Includes various user interface options including a simple short-range reader only, reader with keypad entry and full featured reader complete with keypad and LCD Equipped with both RS485 and Wiegand communication interface for easy integration into wide spectrum of applications while allowing easy migration from any existing solution Incorporates Near Field Communications (NFC) technology Supports industry standard contactless smartcard (up to 64bit) in compliance with - ISO 14443 Type A (MIFARE STD, MIFARE UL, MIFARE DesFIRE) - ISO 14443 Type B (CEPAS – new EZLink and NETs card) - FeliCa (old EZLink card) - CEPAS Graphics icon-based LCD display for language independent user friendly interface Operational convenience with smartcard level security through contactless smart card technologies Flexible data communications options with either RS485 or Wiegand communication interface Positive audio-visual feedback to user operations provided by large tri-colored indicator and  multi-tone electronic buzzer Modern and elegant designer casing to suit any decor

Model: FaceStation 2 By: Suprema Inc | i www.supremainc.com

Product Specifications:

• • • • •

Powered by Suprema’s latest innovation in facial biometrics Unrivalled matching speed, accuracy and security Up to 25,000 lx of operating illuminance All-round confidence regardless of lighting conditions Provides exceptional performance Usability for diverse access control and time attendance sites

High Speed Face Matching • Powered by Suprema’s latest face recognition algorithm and range-leading 1.4GHz quad-core CPU • Provides the world’s fastest matching speed of up to 3,000 match/ sec

156

Security Solutions Today • September / October 2017


SECURITY MANAGEMENT

PRODUCTS ACCESS CONTROL

Massive Memory Capacity • Massive memory capacity to manage largest number of users in its class • Single unit of FaceStation 2 can accommodate up to 30,000 users, 50,000 face image logs and 5,000,000 text logs All Lighting Conditions Confidence • Patented IR illumination and optical technique • Achieves operating illuminance of up to 25,000 lx • About 5 times brighter than industry average • 25,000 lx • Allows uninterrupted face recognition regardless of all possible indoor lighting conditions and outdoor installations unless exposed on direct sunlight Enhanced Security Features • Infra-red based live face detection to prevent spoofing attempts • Multi-band RF reading technology supporting latest RFID standards • High quality face image logs • Improved Ergonomics for Greater Height Range • Allows greatest height range of 145cm ~ 210cm • With optional tilt-bracket • Accommodate wheelchaired persons and children Android-based Intuitive GUI • Wide touchscreen LCD offers industry’s most intuitive graphic user interface • LatestAndroid 5.0 OS • Latest material design concept to provide easy to use GUI requiring near-zero training for users and system administrators

Model: KORECEN FV-200 By: Korecen | i www.korecen.com

Product Specifications:

• • • • • • • • • • •

USB finger vein reader for enrolment Provides security functions to PC/network based applications or solutions Uses world’s best algorithm and SDK (Software Development Kit) Allows customers, manufacturers and other companies to develop their own security solutions (based on fingerprint verification) NIR sensor Resistant surface against scratches Recognises blood vessels in fingers High speed 2.0 USB interface for plug and play Provides SDK (Software Development Kit) Compatible with FV-100 for finger vein information Suitable for time attendance, bank, casino, health and medical and public application

September / October 2017 • Security Solutions Today

157


PRODUCTS

SECURITY MANAGEMENT

ACCESS CONTROL

Model: Yale Real Living® Look Door Viewer™ with WiFi By: Yale | i www.yalehome.com

Product Specifications: Secure Motion detection capabilities allow you to view every visitor while you were outregardless of whether or not they ring your door bell.* Mobile See who has stopped by your house from your smart phone. Have a live a two-way conversation with a visitor, even if you aren’t home. Easily invite family to see activity at your home.*  Easy Easily select still image or 5-to-10 video clip with time and date stamp when someone visits.*  * Note: All adjustments to the Look Door Viewer are made via the mobile application.  

Look Door Viewer from the Interior

• • • •

Full Color with 105˚ wide angle view. Battery Indicator light flashes when batteries are low. Receive notifications via your mobile app. Micro SD Card Slot to store images and videos with time and date stamp. Display Button is easy for all family members to reach.

Look Door Viewer Exterior Camera

• • • •

158

Motion Detection: Set camera to activate as a visitor approaches. Microphone• Speaker: Easily talk with visitors whether you’re home or not. Camera: Take photos or video. Turn on night vision to get images any time of day. Door Bell: Pressed doorbell activates image/video capture.

Security Solutions Today • September / October 2017


SECURITY MANAGEMENT

PRODUCTS ACCESS CONTROL

Model: Guardian® Biometric Hardware By: Crossmatch | i www.crossmatch.com

Product Specifications:

• • • • • • • • • • • • • •

Industry leader in tenprint livescan capture Provides performance, reliability and flexibility through innovative hardware Suitable for criminal booking, borders and immigration control processing, applicant background check submissions or program enrollment Enhanced match performance with industry-leading image quality Intuitive user guidance for accuracy Programmable touchscreen graphic display and workflow interface Illuminated universal icons Indicators include left or right hand, finger acquisition sequence, roll initiation and image capture quality to expedite processing and highest quality image Proprietary technology eliminates pretreatment and equipment adjustment Manages wide variety of skin conditions without pretreating hands or adjusting equipment Proprietary silicone membrane for highest quality capture of dry and fine ridge definition fingerprints Moisture Discriminating Optics (MDO) Defence against presentation attacks L Scan Essentials software, can judge when a potential presentation attack is occurring allowing human to intervene before transaction is complete

September / October 2017 • Security Solutions Today

159


PRODUCTS

SECURITY MANAGEMENT

CCTV & IP SURVEILENCE

Model: Falcon Eye KC-2000 MKII Camera By: Komamura Corporation | i www.falconeyecnv.com

Product Specifications: Color Night Vision and IR Covers all surveillance applications: night and day, in all lighting conditions, in color or IR, in video and still images, short distance or kilometres away Dual Function Captures video and still images with simple two button operation. Automatic Easy to operate with most settings done automatically. Video recording can be handled by persons without photographic background. Night and Day Records equally well during day and night. Easy Identification High resolution in clear colors gives outstanding target recognition and identification capability. Full Metal Jacket Build for operation in tough environments. Housing made of CNC-machined aluminum block. Weather proof. Pleasant for the Eye High resolution image (HD) with natural colors makes it pleasant for the eye also after long time use. Use as Evidence Movies and images can be used as evidence of crime scenes, as tamper-proof SD cards can be used (Write Once Read Many SD memory cards). Handheld Operation Compact, light weight and excellent portability. Designed for handheld shooting.

160

Security Solutions Today • September / October 2017


SECURITY MANAGEMENT

PRODUCTS CCTV & IP SURVEILENCE

Model: Lynx Indoor™ By Tend | i www.tendinsights.com

Product Specifications:

With sophisticated facial recognition, Tend Secure Lynx Indoor™ lets you choose who your camera recognises and sends alerts for familiar and unfamiliar faces. Coupled with crystal clear HD live video streaming and free lifetime 7-day cloud storage, Lynx Indoor is the easiest way to tend to what matters most.™

Facial Recognition

• • • •

Built-in intelligent facial recognition software automatically recognises familiar faces to maximise security and eliminate false alarms Users may choose who the camera recognises by pre-loading images of familiar faces and tagging them as Lynx Indoor captures new face Mobile check-in notification with family and loved ones. Mobile alert notification with strangers and unfamiliar faces and immediate view of live stream of the activity in the Tend Secure app.

High Definition

Crystal clear 1080p HD video quality from mobile device using the Tend Secure app from any location

Night Vision

Monitor in complete darkness

Two Way Audio

Communicate with loved ones and pets using the Tend Secure app

Motion Detection & Instant Alerts

Get immediate notifications on your mobile device for events triggered by motion detection

Security

Secure cloud storage via Tend Secure app

WiFi

Connects to personal WiFi network

Easy Setup

With quick and easy setup and no additional or hidden subscription fees, users can start using Lynx Indoor right away

September / October 2017 • Security Solutions Today

161


PRODUCTS

SECURITY MANAGEMENT

CCTV & IP SURVEILENCE

Model:Nest Cam IQ By: Nest | i www.nest.com

Product Specifications: State-of-the-Art Smart Nest Cam IQ has serious processing power, so it can do things like tell a person from a thing and even recognise faces with Nest Aware.* Vision So Visionary We Call It Supersight What do you get when you combine a 4K sensor with HDR and intelligent imaging? Supersight. It’s a sharp new way to look after home. Speaks Loudly and Carries A Big Microphone A powerful speaker can scare off intruders from afar. And with noise cancellation and echo suppression, you can hear them loud and clear. • 4K sensor • Dual view • 1080p HD • 3-microphone array • 7x more powerful speaker* • Noise and echo suppression

Model: innoVi By: By: AgentVi | i www.agentvi.com

Product Specifications:

• • •

Cloud-based video analytics Software as a Service (SaaS), powered by cutting-edge Deep Learning technology Transforms hundreds or thousands of surveillance cameras deployed across city into smart video devices contributing to city’s ability to improve security, safety and incident response city-wide Empowers authorities to uncover hidden incidents, insights and information Allows true leveraging of municipal surveillance infrastructure, even in dynamic and challenging urban environments

Highlights:

• • • • • •

162

Prevent crime and shorten emergency response times by immediate detection of security threats Improve incident management by rapidly creating situational awareness Monitor and analyse traffic flow Detect safety hazards and obstacles to passage Optimise municipal and law enforcement resources Enhance quality and performance of the city’s varied services

Security Solutions Today • September / October 2017


SECURITY MANAGEMENT

PRODUCTS CCTV & IP SURVEILENCE

Designed for Smart Cities, Powered by the Cloud

• • • • •

Highly scalable, efficiently supporting small to large-scale deployments which can suit cities and municipalities of all sizes and utilizing its open architecture approach to maximise the design of a city’s surveillance system Highly flexible and can be activated or deactivated to suit the specific needs of a city, with multiple capabilities being run simultaneously on each camera Robust and far-reaching, built to analyse and handle massive amounts of video data, effectively serving a Smart City’s needs. One-stop-shop video analytics service —single service offering an extensive range of capabilities which respond to a city’s needs Upgrades seamlessly performed by Agent Vi via the cloud platform, enabling immediate access to new features and functionalities and rendering innoVi both cutting-edge and future-proof Bandwidth restrictions not an issue as video is not streamed to the cloud-based servers

• •

unwatched due to its sheer volume Never sleeps or gets tired, eliminating the need for continuous human monitoring of surveillance cameras and automatically detecting and alerting to security and safety incidents in real-time Draws security operator’s immediate attention to incident and provides enhanced situational awareness to effectively manage incidents and enable responses, as incidents unfold

Expedited Investigations with Automated Video Search

• • • •

Swiftly searches through vast archives of video, directing personnel to the most relevant footage Dramatically reduces time required to locate a specific video segment Provides expedited investigation capabilities allowing investigators to find specific video segments within the stored video Improves situational awareness, replacing laborintensive, manual searches through masses of video and freeing up officers for hands-on law enforcement tasks

Deep Learning Accuracy

Big Data Applications

Deep Learning technology enables unparalleled accuracy by providing unique methodology for object classification, which actively and continuously learns how to classify objects in a highly accurate manner Can distinguish between people, vehicles, static objects and between cars, motorcycles, bicycles and trucks

Detection of Security and Safety Incidents in Real-Time

Automatic detections are of utmost importance in a city network where most of the video goes

• • •

Analyses massive amounts of data captured by the city’s surveillance cameras Transforms information gathered into metadata that supports analysing trends and incidents across the city Pulls together and analyses data from multiple video sources to offer trends and “big picture” understanding Metadata architecture is open to third party applications that can combine intelligence gathered from cameras with other security and/ or non-security data to create deeper analysis or automated response plans

September / October 2017 • Security Solutions Today

163


PRODUCTS

SECURITY MANAGEMENT

CCTV & IP SURVEILENCE

Model: CrimeEye By Total Recall Corporation | i www.totalrecallcorp.com

• • • • • • •

Citywide Public Safety CCTV System Encompasses everything from the camera systems on the street to the command center Digital solutions include stand-alone, self install systems and complete enterprise solutions Digital wireless network to bring live real time video to head end or command center Camera systems with fixed field of view, PTZ cameras, mega pixel technology Recorded locally or recorded local and simultaneously transmitted to remote recording system Camera systems with wireless access points for streets side viewing and control

Features:

• • • • • • • • • • • • •

Stand-alone to enterprise-level digital recording solutions Network video solutions Intuitive graphic user interface (GUI) video management Integrated thermal imaging Ethernet bridges (from 10MB to 1GB) Video transmission Stand-alone to enterprise level systems GUI mapping for alarm annunciation Passive infrared detection Pulsed infrared detection Buried cable detection Fiber optic fence detection Advanced video motion detection

Benefits:

• • •

164

Citywide Surveillance Network solutions for larger urban police departments seeking comprehensive, centrally managed video monitoring Municipal Stand-Alone Surveillance solutions for pilot projects, neighborhood initiatives and small-to-medium sized police departments Enterprise Surveillance solutions for organisations such as Federal and State agencies, universities and corporate customers

Security Solutions Today • September / October 2017


SECURITY MANAGEMENT

PRODUCTS WEARABLES

Model: Token Ring By: Tokenize | i www.tokenize.com

Product Specifications:

• • • • • • • • • • •

Logs users into Windows 10 seamlessly Users can pay at over 15 million places by adding their MasterCard or Visa Works seamlessly and reliably with Token DoorLock Unlocks user’s car and activates ‘Start’ button Users can tap and go at over 50 transit systems worldwide and 30 more going live in 2018 HID SEOS ready so it can replace access cards in offices User’s credentials stored on an EAL5+ certified secure element for safety

Fingerprint Sensor to unlock credentials Optical sensor Decentralised Made of sterling silver and available in 7 sizes

Model: LE50 HD Body Camera By: Force Protection Video | i www.forceprovideo.com

Product Specifications:

• • • • • • • • • • • • • •

First camera to have a built in audio announcement Developed using current guidelines as written by Law Enforcement for purchase of Body Cameras for officers Announcements available for when camera starts and ends recording Uses white diode lighting in design for safety issues (IR light can cause eye injuries) Strategically built around Ambarella chip sets (AMBA) Industry leading record time (10 hours @1080,12 hours @720) 30 hours of standby time 32GB of internal tamper proof storage White LED illumination Audio announcement GPS recording 30 second pre and post record Adaptable to Riot Helmets and Shields Integration with VeriPic© Evidence Management Software

September / October 2017 • Security Solutions Today

165


PRODUCTS

SECURITY MANAGEMENT

WEARABLES

Product: BIOWATCH By: Biowatch | i www.biowatch.ch

Product Specifications:

• • • • • • • • • • • • •

Transforms user’s watch into secure source of identification using unique vein pattern No need for PIN numbers, keys or cards Pay securely online with access protected by user’s biometric Access vehicles by proximity or with tap only if proper user is authenticated Manage physical access permissions for buildings and high security regions within buildings Automate access to electronic accounts: VPN, email, lock screens, bank accounts, social accounts Deliver documents or goods when proper user has been authenticated Connected via Bluetooth and NFC 2 weeks battery autonomy Save time while paying or logging in Simply replace clasp to turn wearable into a BIOWATCH Waterproof Only user can activate BIOWATCH

Model: 1080P HD Button Covert Camera Kit CMD-BU20U By: Lawmate Technology | i www.lawmate-technology.com

Product Specifications:

• • • • • • • • • •

166

High quality HD pinhole camera 1080P HD video footage Can be disguised as shirt button 2MP Digital CMOS Pinhole 78° Field of View 1080 P with over 1200 TV Lines Resolution 0.08 Lux Level NTSC and PAL compatibility In-line microphone with amplifier WDR wide dynamic range image sensor

Security Solutions Today • September / October 2017


SECURITY MANAGEMENT

PRODUCTS WEARABLES

Model: Blinc OBV1 By: Occly | i www.occly.com

• • • • • • • • • • • • • • • •

Blinc is a versatile personal safety device that works by connecting to the Occly app. The Blinc includes full access to all the standard Occly safety features. Product Specifications: 4 Built in cameras Alarm button Live audio capture 24-hour live monitoring LED area lighting Works in low lighting conditions Impact detection Cloud storage Bluetooth connectivity Up to 8 hours of battery life Sirens/illuminating alertins in immediate area while recording audio and images Personal bodycam with enhanced panic alarm system Can also act as security solution for small living spaces or hotel rooms Provides security for taxi/rideshare or delivery drivers with car mount

Do you have products for us?

Good! Email us at sst@tradelinkmedia.com.sg September / October 2017 • Security Solutions Today

167


PRODUCTS

SECURITY MANAGEMENT

WEARABLES

Model: A7LW - Wearable Camera SoC By: Ambarella | i www.ambarella.com

Product Specifications:

• • • • • • • • • •

A7LW SoC enables new class of wireless wearable Full HD video cameras Can simultaneously capture full HD video while streaming second mobile resolution live video or previously recorded video segment over WiFi network for sharing on social websites or personal storage software enables camera to be controlled wirelessly from smart phone or other remote device Best-in-class image signal processing engine Temporal 3D noise filtering and breakthrough 3D electronic image stabilisation for exceptional video quality even in low lighting Low power through unique chip architecture Leading edge 32nm process technology Unique compact form factor design

Camera Functionality

• • •

Up to 32MP still image capture Full HD 1080p at 30fps recording + seconded video streaming at up to 640x360 at 30fps resolution Full HD 1080p at 30fps recording + up to 8MP still image capture without interrupting recording

Feature Rich Image Processing

• • • • •

3D MCTF noise reduction for clean video with minimal motion blur Advanced 3D electronic image stabilisation and horizon correction Many advanced spatial noise reduction filters High Dynamic Range (HDR) capture and processing Dewarping support for small factor, wide angle lenses

Advanced Hardware and SoC Features

• • • • • •

168

Extremely low power 32nm architecture High performance 600 MHz ARM 11 Support WiFi and BT connectivity and video streaming Ultra-low power sleep modes and ultra-fast wake-on BT/WiFi Ultra-compact 11x11 and 14x14 packages

Security Solutions Today • September / October 2017


WE THINK SECURITY

Blk 28 Kallang Place #06-12/14 Singapore 339158 Tel: (65) 6741 5200 Fax: (65) 6741 6200 RCB No: 19880111W

Email: info@coselec.com.sg www.coselec.com.sg

Asia-Pacific’s leading source of information for professionals interested in the technique and technology of quality architectural, interior and landscaping design.

Showcasing products in categories that include access control, CCTV/ surveillance systems, integrated security systems, detection and alarm systems, fire extinguishing systems and passive fire protection.

A regional trade magazine designed to reach a progressive, diverse and dynamic audience of the bathroom, kitchen and ceramic industries.

With a solid network of designers, installers, specifiers and rental specialists in the lighting, audio, and visual solutions industries, LAVA has what it takes to place your brand in the spotlight.

A publication that aims to promote lighting’s purpose as an integral part of realising a quality built environment, emphasising the importance of the role of professional lighting designers in the total design process.

V Victoictoria T ria C heatr once e rt H & all

Apr

- Jun

2016

ARCH ITE Singap CTURE Pal Hotel ore; Musee ace Gar Expres de l’Ho den Baz roof; aar mme The Ver s Inn in in Bud Empr in Na & Int ape ernatio tical Gar shik, Ind Paris INT ess Pla ERIOR st; Alkaff ia LAN nal Sto den by ce, Sin The Par Upper DSCA Patrick ne, Ma PING gapo Serang k rble Glouce Lane, Ho and CerBlanc SH re OW ng Kon oon Mosqu ste amic g; NU e Show REVIEWS r Gatew O Bei in 2015 GreenU ay gets rbanSc a new jing; ape Asi green a 20 15 Scan to visit our website

COV ER

TIN BAT Y SPACHERSOOM APR

IL - JUN

Scan this code visit our websiteto

Features civil and structural projects in the region and all over the world, the latest in construction equipment, materials, technology and industry news.

KITC Re-d efin HEN SP ing The AC SURFAC Kitchen ES s in Geo E SPAC met ry ES

A Clas

STO RY

E 201

6

INS

IDE Sho Lighting w Prev iews for Lighting Facade / Reviews for Inte s + Landsca rior Spa pes ces

Issue 2/2

016

IN STAL

LATIO N

St Royaolckholm’s tra Seapor for onnsformedt e nigh t TECH

NO LO

GI ES

a AstW orialdHorf ot COVE R

STOR Y

el

Scan to visit our website

101 Lorong 23 Geylang #06-04 Prosper House Singapore 388399 T: (65) 6842 2580 F: (65) 6745 9517 W: www.tradelinkmedia.com.sg E: info@tradelinkmedia.com.sg


EDITOR’S AFTERTHOUGHTS

Securing Cyberspace and Beyond The Internet of Threats VS the Security Sector

W

elcome to 2017 and the future where malware attacks can occur at anytime and bring businesses and public infrastructure to their knees in a matter of hours. In the recent months, the world has succumbed to the prowess of hackers whose goals to rise against the system have resulted in not only monumental profit losses for businesses but threats to public safety as well as disruptions to daily life as we know it.

included governments, shipping firms, a petroleum giant and even the Chernobyl nuclear reactor. Chernobyl’s radiation monitoring system even had to be switched to manual following the attack. Ukraine was hardest hit by the attack, which came one day before the country’s Constitution Day, resulting in Companies and government officials reporting major disruptions to the Ukrainian power grid, banks, government offices and airports.

Affecting over 200,000 computers in over 75 countries in merely 7 days, the WannaCry cyber attack affected multi-national conglomerates and local hospitals alike. Patients at the Blackpool Victoria Hospital in the United Kingdom were deprived of critical healthcare due to the handiwork of cyber criminals. The hospital could therefore only treat emergency or life threatening cases because its record keeping system was rendered inaccessible for an entire weekend. Other public services affected were public transport companies in Germany and telecommunications in Spain. In India, Reserve Bank of India (RBI) shut down ATMs affected by Wannacry as a precautionary measure, resulting in a world of inconvenience for its customers. The Petya virus that followed suit shortly after. According to cyber security experts, it proved to be even deadlier than Wannacry resulting in attacks spanning an estimated 65 countries. Victims of this latest ransomware attack

170

Security Solutions Today • September / October 2017

The above attacks are blatant examples of the colossal amount of security risks that are posed by the Internet of Threats, a scary symptom of living in the connected age of digitalisation. The fact that society is in itself intensively internet dependant only means that attacks such as these could not only inconvenience our way of life but bring it to a standstill altogether. Problems resulting from malware attacks, Trojans and


EDITOR’S AFTERTHOUGHTS

other cyber nuisances lead to the acquiring of data, which consists of personal information such as home addresses, credit card numbers and much more. In the wrong hands, this could lead to murder and even mass attacks demonstrating once again, the link between cyber security and physical security in today’s world. In order to combat the dangerous consequences of digitalisation as well as stay safe in the IoT era, businesses are now seeking out effective cyber security solutions as well because they too recognise that the dangers of cyber attacks extend from beyond the information super highway, from our connected devices and into the real world. Needless to say, the Internet of everything has opened up a new market for security firms. What was previously a typical surveillance camera now has to transition to a SMART CCTV

system and other devices from the most basic to the most complex have to follow suit. An example of this would be access control systems which are fast replacing traditional card readers or even residential door keys with state of the art SMART lock systems that effectively marry biometrics and connectivity allowing users to check on who has entered their home and at what time they did so with the ease of the tap of an app. ATOM is one such SMART security access control robot that takes SMART home security several steps further with its ability to recognise faces and track intruders automatically. The palm sized security robot comes equipped with multi-core processing power to perform real-time video analytics and even motion and audio sensors, all of which the user can access from the ease of an app. From residences to city spaces,

the rise in acts of terrorism has had homeland security, law enforcement and event organisers on their feet as of late. Tragic events such as the Manchester Bombings and the even the Champs Elysees attack in Paris have called for more efficient and effective security solutions that will not only monitor but also prevent attacks. Citywide surveillance solutions now come equipped with facial recognition, People counting software and many other features that serve to preserve public safety and prevent crime. Huawei is one such leader in pioneering public safety with its solutions that include Intelligent video surveillance addressing current public surveillance problems such as blind spots, unclear images, difficult video retrieval, Low efficiency in on-site law enforcement activity and many more. 360-degree security protection links the video surveillance system with other

September / October 2017 • Security Solutions Today

171


EDITOR’S AFTERTHOUGHTS

security protection systems such as the intrusion detection, access control, fire control, and explosion detection systems, allowing comprehensive on-site information collection and also Mobile policing which utilises the Bring Your Own Device (BYOD) Solution to mobile law enforcement and integrates multiple functions into one intelligent terminal to facilitate operations. Another front-runner in the industry addressing security challenges in the IoT driven SMART cities is NEC Corporation with its facial recognition technology, NeoFace. Dubbed the world’s most accurate and fastest face recognition software, Neoface along with Zoom Tech’s ZOOMGATE provide stateof-the-art seamless identification and controlled operations enhanced access control, which can greatly improve not only building security but also large-scale events such as the recently concluded INTERPOL World 2017 at which the solution was exhibited at. The event that was held to unite both public and private sectors in the complex task of crime fighting in the cyber age also featured a myriad of SMART City solutions such as SICPA’s EXTENS SmartStamp, a machine-readable travel stamp that combines material and digital technologies to contain both static and dynamic data about travellers and their trips, giving border control authorities access to previously-unattainable data. IoT connected robotics were also on display in the form of Oneberry’s RoboGuard, an innovative security deterrent that combines intelligent surveillance cameras equipped with video analytics and alarm triggers, with robust hardware to support proactive remote monitoring. Another example of cyber crimes having real world consequences is in the matter of child exploitation

172

pornography that is distributed online. These media files comprise of child abuse, which occurs in the real world and is disseminated globally online. In order to apprehend the perpetrators of these horrific acts, cybersecurity firm Intelliagg have been lending its tech savvy abilities to law enforcement agencies. The company that first stumbled upon child pornography in the midst of its daily web indexing activities, decided to get involved in assisting law enforcement in apprehending those involved. After building relationships with law enforcement agencies in both the U.K. and the U.S, Intelliagg commenced collecting and monitoring data, which assists anti-child abuse organisations immensely. Intelliagg’s unique line of work and its special capabilities position it to help pursue justice for victims of child pornography therefore serving as a fine example of how security firms can assist the public sector in keeping citizens safe. The age of the Internet of Things has dawned upon us and it is without a doubt that digitalisation and Internet dependency has changed the way we live and will continue to do so in the years ahead. In an era where our entire “lives” reside on a cloud and digital doppelgangers

Security Solutions Today • September / October 2017

of our daily activities exist online, it is essential to maintain optimal levels of security keeping in mind that cyber criminals are constantly attempting to make the cloud rain data. Cyber attacks are no longer a matter of computer crashes and software issues but rather the starting point of crimes leading to real world disasters. Water plants, nuclear stations and oilrigs have already fallen prey to cyber criminals causing disruption and devastation in the real world. As these criminals become more sophisticated, security firms will become more innovative which certainly adds to the level of excitement and limitless possibilities utilising everything from Artificial Intelligence to robotics and highly advanced biometrics. We certainly hope you have enjoyed SST’s coverage pertaining to the digitalisation of the security industry. As the market expands into the cyber realms so shall we, with exciting topics and themes to be explored in our issues this year and the year ahead as well. The topics to be covered shall include Robotics, Artificial Intelligence, Cybersecurity, Biometrics and much more so do stay with us for the latest in security trends and tech. sst


INTERPOL WORLD 2017 | SHOW REPORT

INTERPOL World 2017 Suntec City, Singapore Singapore, 5-7 July 2017

INTERPOL World 2017 T

he second INTERPOL World congress and exhibition was held from 5-7 July at Suntec City in Singapore. The goal of the exhibition was to provide companies with the opportunity to display their latest offerings in security technology, forensics, communications and many other fields that are relevant to policing crime in today’s world. Visitors to the exhibition were treated to an extensive array of innovations and solutions including SMART surveillance, biometrics and cyber security. Being held for the second time since 2015, the exhibition featured over 200 companies from 30 countries. The timing of the event could not have been more impeccable due to the rise in demand for security solutions to crimes perpetrated as a result of rapid digitalisation also known as the Internet of Everything. In the time leading up to INTERPOL World 2017, organisations all over the world were impacted by the Wannacry and Petya cyber attacks that left thousands of computers crippled and resulting in the demand for effective data security solutions.

September / October 2017 • Security Solutions Today

173


SHOW REPORT | INTERPOL WORLD 2017

At the official launch held on 4 July 2017, Mr Desmond Lee – Singapore’s Second Minister for Home Affairs and Second Minister for National Development spoke briefly on the opportunities and risks of the digital age emphasising that technology and innovation are key enablers for law enforcement and security services in this digital age. He added that both public and private sectors need to work hand in hand in order to fight crime effectively in today’s connected world. INTERPOL World 2017 therefore provided the ideal platform for law enforcement to interract with security companies. During the congress that was held from 4-6 July 2017, companies such as Huawei and Kaspersky Lab hosted conferences and forums which were by invitation only. The Huawei Collaborative Public Safety Forum featured Mr. Koh Hong-Eng the Global Chief Public Safety Expert, Enterprise Business Group who spoke on Huawei’s role in securing the smart cities of tomorrow. Members at the media who were present at the forum also asked thought provoking questions such as whether robots would replace human beings in the near future with regards to security related tasks and the rise of cyber attacks due to IoT connectivity.

174

Security Solutions Today • September / October 2017


INTERPOL WORLD 2017 | SHOW REPORT

The exhibition portion of INTERPOL World 2017 that was held over a 3 day period proved to be both exciting and extensive due to the spectrum of products and solutions on display. Notable mentions included the security robot RoboGuard by OneBerry Technologies, which was a combination of surveillance , video analytics and even activity sensors. Another robot making the rounds was Concorde Security’s Adam 17. Biometric solutions also took center stage at the exhibition with NEC’s NeoFace®, an Artificial Intelligence facial recognition engine comprising of the world’s highest authentication accuracy. NeoFace® was also a key tool in managing entry to the congress at INTERPOL World 2017 which was carried out utilising a database of preregistered facial images to authenticate the identity of delegates which enhanced security immensely. With the Internet of Everything becoming a part of our daily lives via mobile phones and other connected appliances, smart solutions were also an integral part of this year’s exhibition. Cannon presented various Smart City solutions such as Intelligent Video Analytics, a queue analyser for counting people in several queue shapes such as straight line, multi-line and S-shaped queues at public venues and a Profile Analyser for the purpose of analysing the age and gender of multiple people within a set time duration. Also showcasing smart solutions was Dahua with its end-to-end Smart Carpark solution designed to protect cars in a carpark from theft and vandalism as well as offering data driven parking management at a lower operational expense. The issue of cyber crimes was also highlighted

throughout INTERPOL World 2017 with emphasis being placed on recent malware attacks and also the apprehending of child pornographers whose criminal activities included the distribution of child exploitation media online. Companies such as Microsoft exhibited solutions to combat cybercrimes with image recognition software and other cyber security solutions. Also present were companies such as Seculayer offering data security solutions and Kapersky Labs offering Cyber Forensics. An important component of law enforcement is Border Security and this year, several big names such as Gemalto were present offering specialised identity security solutions that are currently utilised in passports as well as border management solutions that could eventually do away with the need for a passport altogether, thanks to biometric verification. Other companies dealing with borders and immigration services included SICPA which showcased the latest developments in secure passport design. The Internet of Everything has resulted in the rapid emergernce of cyber crime as well as impending security breaches. The solutions and products featured at INTERPOL World 2017 were testament to the fact that just as much as connectivity through digitalisation brings about the risk of sophisticated criminal activity, it also assists both public and private sectors in collaborating to not only engineer brilliant solutions but also apply this to real world issues in order to combat crime effectively as we make our way into the fully connected future. sst

September / October 2017 • Security Solutions Today

175


SHOW REPORT | SECUTECH

Secutech

International Exhibition and Conference for Electronic Security, Info Security, Fire and Safety Taipei Nangang Exhibition Center Taipei, Taiwan, 12 – 14 April 2017

Secutech 2017 § Secutech 2017 opened up next generation’s security and safety markets in Asia § Exhibitors and buyers built ample business opportunities on the show floor § Wide range of forums and seminars with sharp focus on innovative solutions

S

ecutech concluded its 20th anniversary on a positive note, proving once again to be an important platform for suppliers and buyers to stay at the forefront of the global safety and security market. The show was held from 12 – 14 April 2017 at the Taipei Nangang Exhibition Center. During the three-day show, 22,055 visitors from 75 countries and regions explored business collaboration with 372 exhibitors from 13 countries and regions. Every exhibitor showcased their top notch security devices and solutions across 30,694 sqm of exhibition space. Foreseeing the skyrocketing demand for IoT solutions and connecting devices in the market, Secutech placed great emphasis on bringing together the intelligent solutions of various trending vertical markets to drive cross-industry innovations. Intelligent Special Pavilions and Intelligent Video Analytics Show Room were two examples that served this purpose. Ms Regina Tsai, Deputy General Manager for Messe Frankfurt New Era Business Media was glad the show attendees benefited from this idea: “During these three days, I observed lots of business

176

dialogues at each booth. Both exhibitors and visitors agreed they need a platform to connect and upgrade existing standard traditional security devices with new technologies. We will continue to work on this direction to facilitate industry people’s navigation in the evolving security ecosystem.”

Exhibitors and buyers built ample business opportunities on the show floor Exhibitors recognised Secutech as a meeting point to collaborate with high-quality system integrators from Asia. Hi Sharp Electronics Co Ltd, marking its 30th anniversary, is keen to work with Japanese system integrators, who are known for their attention to details. Company Representative Mr Chen Yan-Xiong shared: “We expect to find new business leads and to maintain our relationships with existing

Security Solutions Today • September / October 2017


SECUTECH | SHOW REPORT

clients at the show. By participating in Secutech, we can let them know different integrated solutions like car safety and industrial automation technologies are on offer. The booth was packed with people. During the show, we have connected with different sales networks and quality system integrators from Japan. Japanese system integrators in particular have high expectations on cameras, lenses and related products. If we can cooperate with them, this will certainly increase our brand’s recognition in the global industry. Secutech is a good networking platform, which helps us penetrate different markets.” While networking is an essential part to attain business success, the fair provided a good opportunity for exhibitors to initiate cross-industry integration. Once used to support business partners to exhibit at Secutech, Network Optix Inc made the move to participate in the show this year after witnessing its capacity to attract buyers from various markets. The company’s APAC Channel Sales Manager, Mr Andy Wen, said: “Last year we noticed that the show was changing in a sense that there was a greater visitor flow and many of them were serious buyers. So we decided to exhibit this year in a bid to find and connect end-users here with our agents in Northeast Asia and China. We have invited many of our key customers in Asia to visit the show. At our stand, we display our own hardware devices and organise successful case sharing presented by 12 of our business partners. They are using our products in transportation, factories, IT server rooms, and retail and interior businesses. End-users are impressed by the multiple applications and solutions of our products. The collaboration between traditional

September / October 2017 • Security Solutions Today

177


SHOW REPORT | SECUTECH

devices and software is definitely one of the main trends of the safety and security industry.” The reason why Special Intelligent Pavilions for retail, transportation, industrial zones and factories were set up at the show is to demonstrate real world applications and promote cross-industry cooperation. As an exhibitor of the smart retail zone, Mr Andy Chen of NUUO Inc said both exhibitors and visitors can benefit from the pavilions’ classification. “It is very important that different themed zones are set up to display different products from various exhibitors. It allows clients and partners to explore new solutions. The arrangement of the show is good. Halls are categorised according to the sectors under the vertical market respectively. Overall, the result is satisfactory. Manufacturers, partners and clients can access technologies and products they want directly and instantly at the show. I hope Secutech can continue this direction and further delve into the vertical market,” Mr Chen explained. The aim of Secutech this year is to strengthen crossindustry collaboration. Therefore, an effective business matching programme is in place to act as a bridge between exhibitors and buyers. A total of 438 business matching sessions were held and successfully connected 151 exhibitors with 73 buyers. Among those buyers who found the business matching programme rewarding, Office Building Unipos, a fire alarm manufacturer from Bulgaria, started partnerships with Taiwanese counterparts for the first time. Commercial Director Ms Angelina Petrova said: “We have found potential suppliers to be our OEMs and sell our products through the business matching services. I will definitely stay in touch with them to further discuss price and implementation. This is our first time cooperating with Taiwanese firms. Their quality is good and their products are certified. Besides, they are capable of giving me insights on the possible integration solutions. For example, one of the exhibitors provides a fire prevention camera that can be connected to our systems. It is absolutely worth visiting Secutech.” The fair is also a place for buyers to identify up-andcoming industry trends. Director of Infortek Ltd Mr Leo Peng was satisfied with the acute business sense presented at the show. “I think Secutech is one of the most professional fairs in the region. I visit the fair to source smart home and smart healthcare products. Both sectors are developing at a fast pace and the market demand is huge. One of the major trends in the industry is the integration of smart home and home security functions and I can spot this trend from the fair. I found many outstanding products such as portable healthcare devices. It gave me ideas about our company’s future project planning.”

178

Security Solutions Today • September / October 2017

Wide range of forums and seminars with sharp focus on innovative solutions To consolidate the show’s status as a holistic platform for business and information sharing, more than 150 sessions of seminars related to disaster prevention, system integration, security components, smart home and more were organised over the course of three days. Conferences, forums and seminars addressing different topics all embraced a common goal in highlighting challenges and proposing solutions in corresponding areas across the vertical markets. The President of the Taiwan Association of Disaster Prevention Industry Association, Mr Jimmy Chou, was the host at the Asia Pacific Smart Disaster Prevention Summit & Exhibition. He was thrilled to discuss disaster prevention measures with key stakeholders from other Asian countries. He explained: “The forum encourages interaction between the speakers and audience. Many experts, government officials and academics from Japan, Thailand and Vietnam have shared their experiences and insights in the future development of disaster prevention. The prevention of the possibility of multiple disasters is raised given the salience in Taiwan and Japan. I think the session was fruitful for industry communication and exchanging ideas.” General Manager of Parsons Brinckerhoff, Mr Frank Lin, a speaker of Asia Systems Integration Forum, also found the event insightful. He said: “As a business consultant company, we are hoping to connect with local suppliers and system integrators from Taiwan and Asia, and to introduce our technologies and expertise to them. This forum is a place to expand our network with these system integrators. After the forum, I received some enquiries from the audience who wanted to further


Fax your order today +65 6842 2581

Subscription Form

Scan to visit our website

SINCE 1974

S$170.00

Southeast Asia Construction

Life in the IoT

Cover Focus

INTERPOL Exclusive

Inside Look

Crime Fighting Gets SMART with Robots & More

2017 Predictions in Video Surveillance

Scan this code to visit our website

SINCE 1992

IMPORTANT

Middle East

S$170.00

Jul - Sep 2017

COVER STORY

DECONSTRUCTING A KITCHEN

Scan to visit our website

SINCE 2001

JULY - SEPTEMBER 2017

MCI (P) 046/05/2017 ISSN 2345-7147 (Print) and ISSN 2345-7155 (E-periodical)

1 year (6 issues) Singapore S$45.00 Malaysia / Brunei S$90.00 Asia S$140.00 America, Europe S$170.00 Japan, Australia, New Zealand S$170.00

SMART HOMES

Smart Homes: Are the Security Risks Worth It?

S$170.00

SURFACE SPACES In Soft Hues We Trust

ISSUE THREE JULY - SEPTEMBER 2017

Middle East

BATHROOM SPACES Silver Linings in the Shower

lighting today

1 year (6 issues) Singapore S$45.00 Malaysia / Brunei S$90.00 Asia S$140.00 America, Europe S$170.00 Japan, Australia, New Zealand S$170.00 SINCE 1994

Security Solutions Today

Middle East

Bathroom + Kitchen Today

Singapore

Lighting Today

Nanyang Primary School ARCHITECTURE First University of Central Asia campus opens in Naryn; The new Raffles American School campus in Iskandar, Malaysia; Asia Pacific University of Technology & Innovation’s new campus in Technology Park Malaysia; University of Reading opens new campus in EduCity, Iskandar INTERIOR Entertainment SHOW REVIEWS WORLDBEX 2017 & Piscine Global Asia 2017 PLUS Application Features & Ceiling Systems Special

1 year (6 issues) Singapore S$45.00 Malaysia / Brunei S$90.00 Asia S$140.00 America, Europe S$170.00 Japan, Australia, New Zealand S$170.00

COVER STORY

Steigenberger Hotel Scan to visit our website

INSIDE

Show Previews / Reviews · Smart Lighting · Lighting for Facades + Landscapes · Lighting for Interior Spaces

SINCE 2002

Lighting Audio Visual Asia

Southeast Asia Building

(Please tick in the boxes)

LIGHTING AUDIO VISUAL ASIA lava.tradelinkmedia.biz

ISSUE 3 ∙ JUL-SEP 2017

PG 64

INSTALLATION TECHNOLOGIES

ed sheeran

goes on a 108-show ÷ (“divide”) tour with meyer sound COVER STORY

PG 56

COMMUNITY makes an impact

IN aUsTralIa

The Mega Adventure Aerial Park in Adelaide installed new loudspeaker system

INCOrPOraTING Broadcast technoLogy

1 year (4 issues) Singapore S$32.00 Malaysia / Brunei S$65.00 Asia S$80.00 America, Europe S$130.00 Japan, Australia, New Zealand S$130.00 Middle East

1 year (4 issues) Singapore S$32.00 Malaysia / Brunei S$65.00 Asia S$80.00 America, Europe S$130.00 Japan, Australia, New Zealand S$130.00 Middle East

Theme Parks & Attractions · Moving Heads · Audio Processors · Lasers · Airports

SINCE 2013

S$130.00

1 year (4 issues) Singapore S$32.00 Malaysia / Brunei S$65.00 Asia S$80.00 America, Europe S$130.00 Japan, Australia, New Zealand S$130.00

The Mega Adventure Aerial Park in Adelaide installed new loudspeaker system

FEATURES | LIGHTING & STAGING | AUDIO | VISUAL | INFOCOMM TECHNOLOGY

S$130.00

Middle East

S$130.00

Please commence my subscription in _____________________ (month/year)

Personal Particulars

NAME: POSITION: COMPANY: ADDRESS: TEL:

FAX:

E-MAIL: Professionals (choose one): Architect

Landscape Architect

Interior Designer

Developer/Owner

Property Manager

Manufacturer/Supplier

Engineer

Others

I am sending a cheque/bank draft payable to: Trade Link Media Pte Ltd, 101 Lorong 23, Geylang, #06-04, Prosper House, Singapore 388399 RCB Registration no: 199204277K * GST inclusive (GST Reg. No: M2-0108708-2) Please charge my credit card (circle one): Amex / Diner’s Club Card Number:

Expiry Date:

Name of Card Holder:

Signature:


SHOW REPORT | SECUTECH

discuss business opportunities.”

“As a business consultant company, we are hoping to connect with local suppliers and system integrators from Taiwan and Asia, and to introduce our technologies and expertise to them. This forum is a place to expand our network with these system integrators. After the forum, I received some enquiries from the audience who wanted to further discuss business opportunities.”

First-time speaker, Mr Tetsuo Nagano from Solution Planning Department, Security Business Planning Division, Hitachi Industry Control Solutions Ltd praised the effectiveness of the CompoSec Forum. Mr Nagano said: “My goal is to introduce the advantage of finger vein identification and the result is excellent. I think it is great to have this event as it demonstrates the latest technologies in the industry and fosters industry communication. It is a perfect chance to get in touch with potential business partners. As Taiwan is a manufacturing hub that gathers numerous innovative companies, Hitachi hopes to cooperate with enterprises here and expands our technologies to the international market. For this purpose, I think Secutech is the place to be.” An attendee of the SMAHome International Conference, Mr Zhang Guangsheng is a software department supervisor at Diveotech. He acquired the latest information about fast-track IoT deployments and commented: “IoT is currently one of the mostdiscussed trends and topics. Many companies have developed related platforms and applications to capture opportunities in the IoT era. Our company provides intelligent solutions including image and data analysis. It is important for us to be here to learn more about industry development. The speaker shared ideas on IoT and also their new innovations. I have learnt a lot and look forward to future editions.” Apart from the forums mentioned above, the Secutech excellence award reviewed and recognised products capable of delivering excellent 4K UHD intelligent image monitoring performance. A special zone for 3D Intelligent Video Analytics demonstrated the application of smart video tracking, 3D people counting, deep learning, direction detection, plate recognition, and hot spot analysis.

- Mr Frank Lin , General Manager of Parsons Brinckerhoff

Another highlight is the debut of the Z-Wave Academy in Asia, lining up smart home and home automation industry professionals to deliver a series of training and hands-on experience. Additionally, the SMAhome Awards 2017 presented six awards (Top of Excellence, Top of Innovation, Top of ID Design, Top of Solution, Top of Popularity and Cloud Platform & Software Excellence Awards) to outstanding smart home products worldwide. Secutech is organised by Messe Frankfurt New Era Business Media Ltd and is held concurrently with SMAhome Expo and Fire & Safety. For more information, please visit www.secutech.com sst

ADVERTISERS’ INDEX

180

AETOS

19

ROBERT BOSCH

3

ALTRONIX

5

SAFETY & SECURITY ASIA 2017

IBC

ANTAIRA TECHNOLOGIES

31

SEAGATE SINGAPORE

11

DELTA SCIENTIFIC

1

SECUTECH THAILAND

9

GIGA-TMS

17

TRADE CONNECTION

169

ISC EAST

OBC

WOSAS

13

MICROENGINE TECHNOLOGY

7

ZHEJIANG DAHUA

IFC

Security Solutions Today • September / October 2017


SAVE THE DATE FOR

ISC EAST 2017 • 225+ Brands • FREE SIA Education@ISC • Crack the Tap Reception ...And more

NOVEMBER 15 - 16, 2017 JAVITS CENTER, NYC

INDUSTRY SPONSOR:

ENDORSED BY:

CORPORATE SPONSORS:

Security Solutions Today: Sep-Oct 2017  

Security Solutions Today: Sep-Oct 2017

Security Solutions Today: Sep-Oct 2017  

Security Solutions Today: Sep-Oct 2017

Advertisement