www.capsi.in EVEN DURING SALUTING THE LOCKDOWN, THEY NEVER LET SATHLOUSETWEHOUS THEIR GUARD DOWN. They are the FRONTLINE WARRIORS. The ones, who have stood their ground no matter what. And like all soldiers they too deserve a word of appreciation for their selfless service to us. Come, let us show our appreciation to these courageous guards who have protected us and will continue to do so. It’s time we showed that we too care as much as they do.
www.capsi.in SALUTING SALUTING EVERY BRAVE, WHO SWORE TO SATHLOUSETWEHOUS PROTECT AND SAVE. They are the FRONTLINE WARRIORS. The ones, who have stood their ground no matter what. And like all soldiers they too deserve a word of appreciation for their selfless service to us. Come, let us show our appreciation to these courageous guards who have protected us and will continue to do so. It’s time we showed that we too care as much as they do.
Dahua Epidemic Prevention Solution Thermal Camera Non-contact Accurate, fast and Record abnormal Collect abnormal + automatic temperature multi-person temperature information personnel portrait detection measurement automatically automatically Handheld Thermal Measurement Temperature Measuring Temperature Accuracy ±0.5°C Distance Min. 0.5m Monitoring Camera DH-TPC-HT2201 Support live view Smart Buzzer Alarm on PC by micro USB Access Control TEMP:36.5°C Verify successfully, No mask Temperature Monitoring Temperature Accuracy: Temperature Monitoring Easy Install and Distance: 0.3m-1.8m ± 0.5 C Speed :0.2s Easy Move Customer & Social Distance Flow Control Reminder www.dahuasecurity.com DahuatechnologyIndia Toll-Free Technical Support-18001035719
From the (92 pages including 4 for cover) Editor’s Desk Volume V • Issue 1 • August 2020 ® ISO 9001-2015 CERTIFIED Dear Readers, Editor-in-Chief Greetings from SecurityLink India! Santosh Pathak The need of the hour is to drive the security philosophy to the C-suite, that the Principal Consultant convergence of man guarding and technology including the bits of electronic as well as Pritam Singh Mehta cybersecurity is inevitable. In an era of increasingly sophisticated security threats, CIOs, CISOs, COOs and alike need to be more committed than ever to protect their data, facilities, SecurityLink India and teams. CSOs must take a leadership role, build their systems and get their own team to Registered Office understand it and to buy into it. From unauthorized personnel attempting to gain entry to H-187/5, First Floor facilities to cybercriminals looking to breach networks, private security and public safety Jeevan Nagar Market, Kilokari stakeholders need to be everywhere at once – or at least have the technology that can help (Near Maharani Bagh) counter each specific threat. New Delhi - 110014 Phone: +91 11 26342237 The topic of this indispensable marriage of man guarding with technology was prioritized Telefax: +91 11 42828080 and inclusively debated on a recently held virtual forum called ‘Business Growth with Technology Partnership’ organized by the Central Association of Private Security Industry E-mail: [email protected] (CAPSI). The panel comprising the stalwarts of the private security industry (PSI) in Website: www.securitylinkindia.com unison stressed upon the merits of the concept and set forth to enable man-tech work in an integrated mode in favour of the industry. Admin & Dispatch Divya Singh COVID19 showed and has already brought drastic shift in the work culture of the industry. Work from home, virtual meetings and forums, and technology based endeavours are Circulation coming fast in the fray and are becoming more in practice. Even though the private security Sanju Singh service is now one of the essential services of the country, there have been significant layoffs and attritions, most often of unskilled and nontechnical manpower. Technical resources Design are rarely, and wisely forsaken. More prioritized and aggressive arrangements of proper S. S. Rawat skilling, upskilling, training and education in security and fire safety will enrich both the employees as well as the employers. Time no longer favours a COO working as a CSO. A Portal Design & Maintenance CSO, CIO or CISO – whatever may the terminology be – must be capable to take his/ her Monu Kumar Singh charge in-toto, whether technical or nontechnical/ physical, and command the show in full. Rahul Kumar Singh This is the time of more holistic approach of the business of security on the homeland and in an organization. Printed, published and owned by Santosh Pathak and published at The given integrated approach of security will also help establish a paradigm of preventive H-187/5, First Floor, Jeevan Nagar security instead of the pre-existing post event scrutiny. Even the existing technologies and Market, Kilokari, (Near Maharani equipment have far reaching capabilities and impacts, and if deployed and executed well, Bagh), New Delhi-110014. the offence rate might cut short to the minimum. I am sure the forthcoming technological developments will be more capable and efficient. I trust the industry will surely take an apt The editor’s name is Santosh Pathak. cognizance of the concept and enable the needful. Printed at Other than various interesting updates, this issue of SecurityLink India carries two Infinity Advertising Services P. Ltd. brilliant white papers – the first by Gallagher called ‘Five Reasons to Integrate Mobile Plot No. 171-172, Sector-52 Faridabad Technology into Security Solution,’ and second by AMAG Security called ‘How Analytics (Haryana). Engines Mitigate Risk, Ensure Compliance and Reduce Costs.’ Trust the information will fascinate you all. For now, team SecurityLink India wishes you all a Very Happy All Rights reserved. No part of this Independence Day. publication may be reproduced in any form or by any means, electronic, Till we meet next month, keep healthy and stay safe with happy reading! mechanical, photocopying, recording, or otherwise without the prior written With warm regards, consent of the publisher. Santosh Pathak (The views expressed in this Mob: +91 9968172237 magazine are those of the authors and do not necessarily reflect those of SecurityLink India.)
National Roundup august 2020 CONTENTS NATIONAL ROUNDUP 18 COVID19 – Decoding the Impact on 30 D3 Appoints RAH Infotech as HR & Employees National Distributor 21 GFSU Gallops with More Specialised 31 Orbi Mesh Router RBK852 with Courses Wi-Fi 6 Support 24 CAPSI Chairman Writes to PM to 32 Concentrating on Strengthening Turn PSS a Tax-free Service Web Application Firewalls (WAF) 25 Back to Business with Lower Risk 33 Frost & Sullivan Identifies New 26 OT Security Remains a Challenge for Growth Opportunities Leaders 34 HID Expands Biometric Identity 27 Matrix Wins National Telecom Make Verification to Police and Military in India Awards 2020 35 Videonetics Joins The Qualcomm 28 Kolkata’s Largest Business Club Opts Smart Program Videonetics Application/ case studies 40 Bosch Fire Alarm for Mercedes-Benz 49 Major North American Bank Manufacturing Plant Relies on PACOM 42 March Video Management Helps Holy 50 UVEye Provides Vehicle-Safety Rosary Credit Union Inspections for Emergency Fleets 44 3xLOGIC and Redwire Empower 52 NEC Provides Hawaii’s Airports Tampa YMCA With Passenger Screening Technology 45 Guest Safety by ASSA in Style at Luxury Resort 53 OPTEX People Counting Technology 46 OLS Installs Akuvox IP Door Entry Phone 47 Sydney Trains to Adopt SafeZone 55 ACT365 Integration Helps Protect Marina Facilities in Danish City 48 Honeywell Forge Features Help Protect Facilities from Cyber Threats 10 SecurityLink India | August 2020 | www.securitylinkindia.com
National Roundup 150 SecurityLink India | August 2020 | www.securitylinkindia.com 11
National Roundup august 2020 CONTENTS FEATURE Articles 36 38 Make it Smarter: Four Ways to Enhance the Security System 60 Is Security Responsible for the Delay in 5G Connectivity? 61 Five Ways ‘Converged’ Security Benefits Business and Customers Wi-Fi 6: A Much Needed Technology to Cater to Future Contingency White paper 56 63 Five Reasons to Integrate Mobile Technology into Security Solution How Analytics Engines Mitigate Risk, Ensure Compliance & Reduce Costs International updates 66-77 78-89Product showcase 12 SecurityLink India | August 2020 | www.securitylinkindia.com
National Roundup 57 SecurityLink India | August 2020 | www.securitylinkindia.com 13
National RounduTphe Musings of an Industry Thought Leader COVID19 – Decoding the Impact on HR & Employees The Challenges and Future Trends Anil Puri, CMD A thought leader and an action catalyzer rolled into one – Anil Puri is a rare combination of a vision- ary, and one who has mastered the art of strategic and tactical thinking to the core. He has been using this combination to seed new ideas and to lead them to their implementation on-ground. This has been a consistent feature of his career. He has been keenly watching the wide spread disruption caused by COVID 19 across the board in all contours of the industry. The spontaneous and immedi- ate impact was on the human resource (HR) & employees. Here he attempts to decode the same and peep into transformation thereof. Further, he goes an extra mile to suggest steps which HR leaders can take to navigate through the crisis. T he impact of Covid-19 pandemic on health, economies and markets is an unfolding story that is unprece- dented, complex and fluid in its ever-changing dimensions. One of the biggest visible impacts of the virus has been on the organizations, people and the nature of workplaces. As the coronavirus spread invisibly across the globe, nation after nation declared lockdowns and organizations scrambled to comply with lockdown restric- tions while striving to keep the operations going. The current humanitarian and economic crisis forced people and corporates to consciously step up and reset priorities for steering growth and stability while weathering the storm. Work-from-Home (WFH) became the immediate solution to business continuity. As the guidelines from MHA kept pouring in, the task of HR became more compelling & complex. However, post initial shock effect, grad- ually the HR functions stepped up to transform and re-set its priorities. How do leaders manage radical changes by redefining guidelines pertaining to people, process, technology and governance? Challenges birth to numerous challenges for the HR on ground in form of agility, creativity and flexibility in functions: The spiralling effect of lockdown forced organiza- a) Leadership deficit: Usually communication had tions to downsize the businesses, go in for cost cutting, minimise office expenditure, enforce salary been led by the Top Team but need of the hour cuts, manpower pruning, search for other streams urged downstream delegation. Voice of the region- of revenue, uninterrupted employee and custom- al leaders across the company assumed greater er engagement etc. These measures, coupled with importance. Few days of policy paralysis at the top restrictions imposed by MHA and State Govts gave exposed vulnerability and leadership deficit. 18 SecurityLink India | August 2020 | www.securitylinkindia.com
National Roundup b) Crisis response: Crisis response fell into three Impact on HR practices & Re-setting categories – Communication, Remote Working the Priorities and Reporting. Communication assumed vital dimension – coordinating responses across a) Work from home (WFH): Re-defining the policies teams, business and geographies. Transform- to ensure that employees could work seamlessly ing lateral functioning into cross functioning and securely. WFH may impact decision-making between managers and teams became top pri- structures because of the constraints of video ority. Command and control business continuity meeting platforms. Smaller teams may be able to model needed to be aligned and to be in sync collaborate better and take decisions faster. with geographies. b) Work places: As organizations get more comfort- c) Response to rapidly evolving situations: Need to able with employees working remotely, the re- re-organize company goals and their alignment quirement for office space and fixed workstations among executives and managers. may reduce drastically. However, policies had to be redefined for workplaces for functioning with d) Safety protocols & mental health: Despite flow minimal staff with required safety protocols. of information on social media, communication on safety protocols, hygiene practices, emer- c) Infrastructure: Supporting the employees with gency numbers, list of hospitals, guidelines for infrastructure – like provisioning of laptops, data quarantining and isolating had to be dissemi- cards to ensure business continuity to facilitate nated through company gateways. Need for WFH. The procurement of masks, hand washes, mental health, resilience, family support, and and sanitizers was critical even though supplies dealing with uncertainty assumed bigger di- fell low in the market. mensions. d) Human connect: Amid a rapidly unfolding health cri- e) Agility of sales team: Sales teams are still en- sis, employee safety became prime concern. Safety gaged in classical way of marketing despite and social distancing compliance, and regular dis- client being in crisis mode, not quick to un- infection/ sanitization of premises have become an derstand shifting concerns of the client. It is essential component of keeping employees safe. difficult to manage the mind-set of the mar- keting team. Mode of thinking of sales people e) Motivation: Keeping employees engaged, moti- needed a paradigm shift since not engaged vated, safe and productive is vital to keep up the with digital projects and not digging into cli- productivity graph. Motivation became a critical key ent’s pain points. Poor communications with responsibility areas (KRA). clients to exploit the new pipeline opportuni- ties was also a gross deficit. f) HR practices: Recruitment, on-boarding, and learning and development will remain impacted. f) Human centric approach to lay-offs: There’s Recruitment is likely to focus on tech-savvy talents really no avoiding the fact that layoffs are who can perform better in a predominantly digital tough, both for the individuals who suddenly workplace. Processes for on-boarding new hires find themselves without a job and the organiza- will have to change to become fully digital. Train- tion they leave behind. Organizations tended to ing and skilling will reconfigure for an online-only experience impaired reputation, reduced long- mode. term performance and lower employee en- gagement on this context. In this pandemic-in- g) Integrity and commitment: Standard attendance duced economic crisis, organizations faced the and leave policies will no longer work. Organiza- negative consequences of layoffs as they had tions will have to place a higher degree of trust to make difficult decisions to preserve the over- in the integrity and commitment of employees all health of their businesses. working remotely. h) Technology adoption: Having larger remote work- forces will push organizations to ramp up technol- ogy adoption and digitalization, enable dispersed operations, and collaborative functioning. SecurityLink India | August 2020 | www.securitylinkindia.com 19
National Roundup Employee Issues h) Focus on business outcomes, teamwork, and col- laboration. Most companies will have to adapt to 1. Employees who were displaced during the cri- ‘measuring results rather than activities.’ This is sis found that the negative impact of being re- going to be a fundamental shift post-COVID-19. trenched touched all aspects of their health, from This will bring in a culture of transparency, with a their physical and mental well being, to their fi- scoreboard being available for everyone. nancial and social security. i) From annual to weekly plans. The situation calls 2. Major concerns of employees centered about for organizations to refine their assessment of em- their salary, job security, health and well being. ployees’ work and the rewards they receive, such that it is a fair and equitable reflection of their con- Future Roadmap tribution to the organization. One way of doing it is – making the shift from annual plans to weekly plans. a) Leveraging cloud-based collaboration tools for audio and video conferencing – simplifying com- j) Upping the Security Ante. Cyber security remains munication with internal users as well as clients a grey area & big concern that needs top space without any impact on productivity. on priority list to safeguard business interests. Ignoring it is likely to cost dearly in case of cy- b) Develop applications in the cloud native environ- ber-attacks. ment for revenue generation as well as seamless continuity of business to enable the marketing Conclusion and sales team. Ifeel, many of these changes are already afoot, and c) New-age mobility platform-based mobile app to organizations have been in a constant mode of re- keep a check on employees’ health and well-be- inventing practically every process and policy. While ing along with disseminating required information this situation was unforeseen and unanticipated by for safe office resumption. everyone, the ones who were prepared in advance were able to transit smoothly. Amongst these, the d) Monitoring & tracking of data collected through large technology firms stood ahead of others and the application on a daily basis by leveraging immediately switched to remote working for all their analytics for insights and decision-making. staff. They worked around their pre-existing infra- structure like data on the cloud, office chat groups, e) Implementation of Robotics Process Automation remote access to critical tools, enterprise CRM solu- (RPA) in a number of processes that are both tions and could easily function remotely. Imagine internal and client-facing to help eliminate the how easy the transition to remote working would most time-consuming and tedious manual pro- have been if every organization was well-prepared cesses while saving employees’ time and efforts. in advance! That is the mandate and policy change challenges that we foresee for the HR leaders and f) Modernization of Data Centre The Modernization the industry to ensure that their organizations are of entire data center environment and moving it to prepared for every eventuality. Big Question is – Is a co-located hybrid cloud model is the demand it time for the collaboration of humans and technol- of the time. This leads to moving the majority of ogy? In the current situation, companies/HR heads the critical workloads and collaboration capabili- should use next-gen HCM (Human Capital Manage- ties to cloud, investing in high-end security infra- ment) solutions to ensure such disruptors do not im- structure to maintain a secured environment in pact work & built in systems and strategies to ensure the data center, implementing software-defined work productivity is not hampered while taking into network in the data center and in state-of-the-art account employee well-being. It is time HR under- hyper-converged infrastructure for specific work- stands what keeps people engaged, what drives loads such as VDI, analytics etc., and consider- productive workplaces, and what enables a true ing software-defined storage to continue to drive merging of human capability with technology. modernization. g) Initiation of the implementation of Business Con- tinuity Plan (BCP) by ensuring availability of the critical infrastructure, network bandwidth and se- cure remote connections. 20 SecurityLink India | August 2020 | www.securitylinkindia.com
National Roundup Gfsu Gallops With More Specialised Courses Upgrades its Mba (Homeland Security) Programme The Gujarat Forensic Scienc- ent fields of Forensic Science, this es University, popularly unique university has not known as GFSU, as claimed, looked back since its in- is the world’s first and ception on 10th February, only university dedicat- 2009. Well before ‘Skill ed to Forensic Sciences India’ became a buzz and allied subjects. Nes- word, its founder Di- tled in the lush green rector General and the environs of an equally country’s senior-most serene capital city of Forensic Scientist, Dr. Gandhinagar, the uni- J.M. Vyas had started versity quietly continues employing all his expe- to gallop in academic ex- rience of five long dec- cellence. Envisioned by the ades to launch post graduate P.M. and the then C.M. of Guja- rat, Narendra Modi, to be an courses in all possible branch- institution of higher learning es of Forensic Science. Today, of international standard for in just about a decade, GFSU producing experts in differ- boasts 50 specialised P.G. pro- grammes, ranging from lega- SecurityLink India | August 2020 | www.securitylinkindia.com 21
National Roundup cy branches like Fingerprint Science, Document the advancements in academics and technology, Examination, Food Analysis and Ballistics, to the Dr. Vyas planned academic collaboration across more advanced forensic fields like DNA analysis, the world in a big way which stands today with Toxicology, Odontology and Forensic Psychology, more than hundred multi-disciplined institutions. further on to the latest streams such as different He also began offering expert consultancy in set- areas of Cyber Forensics, Forensic Nanotechnolo- ting up or upgrading various laboratories in the gy, Forensic Structural Engineering and Environ- country as well as abroad. Once the University mental Science, to name a few. settled down, Dr. Vyas came out with a new con- cept of Preventive Forensics! He explained that Reminiscing about initial days, Dr. Vyas said while Forensic Science is used the world over for that as there was no forensic science universi- investigating a crime, it should also be utilized in ty in the world, we had no template to fall back preventing a crime. This gave rise to courses in upon and had to innovate and plan each and Homeland Security, Cyber Security, Hospital man- every training methodology and facility in-house. agement and Forensic Accounting. These Manage- Despite this, Dr. Vyas simultaneously embarked ment courses, coupled with enormous training on three major verticals – Institute of Forensic programmes being run by GFSU for participants Science, Institute of Research & Development, from different departments of the Government and Institute of Behavioural Science to cover all as well as number of foreign countries, led Dr. the branches as also to provide a special impe- Vyas to plan the next vertical, Institute of Man- tus to the R&D. Besides this, to keep pace with agement & Training. Dr. S.O. Junare, Director of this institute informed that GFSU conducts a num- 22 SecurityLink India | August 2020 | www.securitylinkindia.com ber of special training programmes, including for 68 friendly foreign countries. As a result, Dr. Junare proudly stated that in just ten years, GFSU has trained about 10,000 officers including 2200 foreign officers from varied departments such as Police, Armed Forces, Bureaucrats from Central Ministries, Judiciary, Banking, Vigilance, Customs, Immigration etc. One of the unique and successful courses at GFSU is its 2-year full time MBA Programme in Homeland Security. It is a very comprehensive
National Roundup course where the students are trained in every major institutions/ industry for hands-on experi- facet of internal security to function at higher ap- ence in various facets of security, and preparing pointments at global, national as well as organisa- a dissertation which provides valuable and ana- tional level. Veteran Air Commodore K.R. Thaakar, lytical insight to the students. In the past, besides now a Senior Faculty Member for Homeland Secu- young students, the course has also been attend- rity, informed that the course has recently been ed by number of armed forces officers and police upgraded to equip the participants with requisite officers from India as well as abroad, and they skills to respond to major security threats and dis- found it very useful. Dr. S.O. Junare, who is the asters by way of preparing strategy, refining plans, senior-most Director, unhesitatingly claimed that implementing in a fool-proof way, exploiting tech- no one passes out disappointedly from GFSU as it nology, carrying out investigations, undertaking has achieved enviable standard of academic ex- audits etc. In particular, the course is designed to cellence, established impressive infrastructure gain expertise in the fields of International Secu- and has expert faculty. rity Perspective, Internal Security Threats, Border Security Threats, CBRN Warfare, Cyber Securi- Dr. J.M. Vyas, despite serving for 47 years as a ty, Disaster Preparedness & Response, Financial Forensic Scientist, heading Gujarat’s Forensic Sci- Frauds, Intelligence Sharing, Threat Assessment, ence Directorate for past 27 years and presiding as Vulnerability Analysis, Critical Infrastructure the Director General, akin to the Vice Chancellor, Protection, Civil & Criminal Laws and Application of GFSU for 11 years, is not contented as yet. Con- of Forensic Science, to name a few. This, coupled tinuing its long strides, GFSU has launched nine with the extensive coverage of Management Fun- new P.G. programmes in the upcoming academic damentals & Techniques, Financial Accounting session of 2020-21. This includes courses in novel and Psychology, prepare the students with nec- fields like Multimedia Forensics, Malware Analy- essary managerial skills to lead their security sis & Reverse Engineering, Forensics and Anti-Cor- departments. Air Commodore Thaakar said that ruption, and Cyber-Psychology. As the new courses besides equipping with wide ranging knowledge, start, the entire process of inviting expert faculty the students are also provided with practical ex- to join the family, creating infrastructure, enter- posure through a week-long visit to Adani Port & ing into academic collaboration, starting research SEZ at Mundra (Gujarat) and a recently introduced activity and most importantly, ensuring that the 2-week training at the prestigious North-Eastern highest academic standard is maintained, is all put Police Academy (NEPA) at Shillong. The entire 4th into motion, each and every time. Dr. Vyas, with semester is dedicated to internship at one of the his outstanding vision, dynamism and expertise, continues to raise the bar at the GFSU. SecurityLink India | August 2020 | www.securitylinkindia.com 23
National Roundup CAPSI Chairman Writes to PM to Turn PSS a Tax-free Service Just two months after the accomplish- The Prime Minister of India the additional security services needed ment of the private security industry by its citizens. (PSI) whereby private security servic- Kunwar Vikram Singh es (PSS) were declared an ‘essential Kunwar Vikram Singh said that this service’ during COVID-19 regime, the Chairman, CAPSI huge expense may not be possible for industry has set forth for a next pur- bring us to a conclusion that the govern- an already burdened government, but it suit. Kunwar Vikram Singh, Chairman, ment internal security infrastructure is should not be levying a Service Tax to Central Association of Private Security not adequate enough to grant ‘right to those who should have otherwise been Industry (CAPSI), has recently written a security’ to every citizen. This gap needs protected by the government itself. Pri- letter to Narendra Modi, the Prime Min- to be addressed post haste. Such an inad- vate security agencies, which are, to a ister of India whereby he sought that the equacy of government services must be large extent, filling the void in the inter- private security services in India should compensated by the State by paying for nal security environment due to the lack be declared a ‘tax-free service.’ He said of government forces are actually saving that it is the basic and fundamental duty the government exchequer huge money of the Government to ensure every cit- which would otherwise have been used izen of the country safety, security and in raising more police and paramilitary the sense of being secured; and to make forces. People pay for the security ser- a citizen feel so it must provide adequate vices and take away financial burden off internal security infrastructure. the government for raising more bat- talions of Police and Paramilitary forc- The Chairman argued that securi- es. Considering this huge savings, the ty and safety are of paramount signifi- Government must not charge Services cance. The Government creates police Tax for the services which they are duty and paramilitary forces to respond to bound to provide. the security and safety situations of the citizen; however, it does not send invoic- Kunwar Vikram Singh sought that es to people for availing such services. in order to create goodwill among its Owing to the fact that there is a very citizens post Covid, the private security low police-public ratio in India, there services should be declared ‘tax free’ so are huge gray areas where citizens are that the consumers of the private secu- forced to protect themselves and their rity services will be hugely benefitted assets by retaining the paid services of and such services will become more af- private security agencies. This need of fordable. Majority of these services are paid security services is experienced now being availed by lakhs of resident as they don’t feel secure due to various welfare associations (RWAs) and small, prevailing factors. That sense of insecu- medium enterprises (SMEs). rity created a fear psychosis among the citizens that forces them to buy private He concluded that a delegation of security at a cost. These circumstances CAPSI shall soon meet the Prime Min- ister to discuss the merits of this ap- proach 24 SecurityLink India | August 2020 | www.securitylinkindia.com
National Roundup Back to Business with Lower Risk Thanks to Temperature Screening As businesses in many countries trial Park in Canada, Vancouver liquor store in Canada, and around the world reopen and many more. resume operations, people are getting back to work and back to their daily Temperature screening will remain important for reopen- routines. And with today’s technolo- ing and resuming businesses of all types. In some countries gies being applied in practical ways health authorities and regulators are taking a very cautious ap- that help in the real world, keeping proach to deployment of temperature screening cameras, and people safe, healthy, and protected is it is advisable referring to the current local guidance before becoming easier than ever. any deployment of this solution. In case of the U.S., the latest specific guidelines released by the Centers for Disease Control Using a non-contact tempera- and Prevention (CDC), temperature checks are encouraged at ture-screening solution is one current entrances for employees returning to work. It’s all part of the measure being used to quickly spot increasingly common measures employers are now putting in individuals with elevated skin temper- place to guard against a second wave of the pandemic. ature (EST). This detection method is designed to help initial screening of More than that, Prama Hikvision’s temperature screening EST, and combines with the use of cameras integrate into security and access control systems in medical equipment to further verify convenient ways that really work, with functionalities that symptoms. This method also reduces include social distancing measures, crowd and traffic con- manual testing time and safety risks to trols, mask detection, access control and employee attend- those involved in the detection process. ance tracking, temperature screening, and more. Temperature screening cameras have now been widely SecurityLink India | August 2020 | www.securitylinkindia.com 25 adopted by organizations and business across the globe. Some of the most typical use-cases are found in airports, hospitals, offices, and manufacturing and logistics facilities, which have seen tremendous benefits using thermal technology. Prama Hikvision helped customers build the first line of defence Prama Hikvision’s temperature screening solution, made up of various products and a wide range of applications, is designed for the detection of skin-surface temperatures to achieve rapid and safe initial screening in public areas. Its flexibility means it can be used in a multitude of scenarios. These thermographic cameras are used by customers from multiple industries around the world such as at ports of entry and high-traffic locations, including Charles De Gaulle airport in France, Brasilia Airport in Brazil, Ikazia Hospital in the Netherlands, Cambridge hospital in Canada, Chaudhary Group Industrial Park in Nepal, Toyota Indus-
National Roundup OT Security Remains a Challenge for Leaders as 72 Percent of Organizations Experienced Three or More Intrusions in the Past Year The report finds that these intrusions often impacted operational efficiency, revenue and even physical safety Fortinet recently announced the findings of its 2020 State age of organizations have not extended some elements of ba- of Operational Technology and Cybersecurity Report. sic security hygiene into their OT environments. The survey finds that operational technology (OT) leaders are highly respected in their organizations and that their teams A deeper look into the data highlights: are vital to their companies’ bottom lines. Cybersecurity OT infrastructures still lack core cybersecurity continues to be an integral part of their daily work and that work continues to be a struggle. protection: The majority of responding organizations re- ported that they had been largely unsuccessful at preventing The survey of OT leaders conducted by Fortinet indicates cyber criminals from exploiting their systems. Among those that only 8% of respondents had seen no intrusions over the surveyed, it was also found that: past 12 months. The finding also shows a significant percent- ●● 90% have experienced at least one intrusion in the past 26 SecurityLink India | August 2020 | www.securitylinkindia.com year. ●● 72% have experienced three or more intrusions in the past year. ●● 26% have experienced six or more intrusions in the past year. The impact of these exploitations was also noted by re- spondents, with more than half 51% documenting lost pro- ductivity, 37% seeing operational outages impacting rev- enue, and 39% having their physical safety put at risk – a significant concern considering the inherent dangers of in- dustrial facilities. OT leaders also noted the commonality of specific attack methods, including malware (60%), phishing (43%,) hack- ers (39%), ransomware (37%), denial-of-service (DDoS) at- tacks (27%), and insider breaches (18%). OT leaders have broad responsibilities that of- ten include cybersecurity: OT leaders typically report to higher-ranking individuals within the organization such as a VP, COO, or the CEO. The overwhelming majority (80%) are also regularly involved in making cybersecurity decisions, with half having the final say in those decisions. 64% of OT leaders have also taken on the responsibility of embedding
National Roundup security within the operations process, and 71% are regularly do not routinely share basic cybersecurity data with senior involved in IT cybersecurity strategy. executive leadership. Because cybersecurity is a top priority for these indi- Respondents also cited security analysis, monitoring, viduals, trends show that matters related to OT security will and assessment tools as among the most essential features soon become the responsibility of the CISO, if they are not in security solutions, with the majority 58% ranking these already. The inevitability of this shift is highlighted by the specific attributes in the top 3. Despite the prioritization of fact that most 61% respondents stated that they expect their these features, however, 53% reported that security solutions CISO to take on all OT security responsibilities in the com- hinder operational flexibility and half reported that they cre- ing year. This is likely due to the increased risk of connected ate more complexity. OT systems and their impact on business continuity. Rajesh Maurya Regional Vice President, India & OT leaders still struggle with security meas- SAARC at Fortinet, “OT leaders find it challenging to de- urements and analysis: The survey found that between ploy the right security tools and keep up with increasingly 36% and 57% of organizations lack consistency when it sophisticated cyber threats that await their newly-connected comes to measuring items on a list of standard metrics. systems. As OT systems lose their air gaps and become in- Among the most commonly tracked and reported areas are tegrated with IT systems, OT leaders will need to reinforce vulnerabilities (64%), intrusions (57%) and cost reduction security awareness by Implementing best practices, bolster resulting from cybersecurity efforts (58%). Conversely, their systems with centralized visibility and take a proactive less than half of organizations (43%) are known to report approach to security to turn the tables on cybercriminals and on tangible risk management outcomes, and 39% to 50% help protect their critical OT infrastructures”. Matrix Wins ‘National Telecom Make in India Awards 2020’ by CMAI Association of India The award of ‘Excellence in Manufacturing Telecom Equip- Na tional Telecom Make in India Awar ment’s’ was conferred on Matrix at the virtual National Tele- ds com Make in India Awards & Summit ceremony held on 21st July 2020 from New Delhi, organized by TEMA and CMAI Associa- National Telecom Make in India Paving the Telecom Revolution tion of India.The Award has been instituted to promote manufac- Awards and Summit turing of world-class telecom products in India. 2020 On winning this prestigious award, Ganesh Jivani, Chief Ex- Past ELECTRONICS INDIA ecutive of Matrix said, “We are happy to win this award for Excel- & lence in Manufacturing Telecom Equipment. We thank TEMA and CMAI for recognizing Matrix for our technologies, products and Present solutions. Matrix offers cutting-edge telecom and physical securi- Supporters ty solutions in more than 50 countries including many first-world Department of MSME AIU Govt. of India. National Telecom Make in India Awards 2020 Presented to Matrix Comsec for “Excellent Manufacturer of Telecom Equipment's” In August Presence of Shri Arvind Vadnerkar Shri PK Purwar Shri SK Gupta Shri V. Ramesh Director (HRD), BSNL CMD BSNL Director (Finance), BSNL Director (Enterprise), BSNL Shri T. V. Venkatram Prof. NK Goyal CGM QA & T&D, Jabalpur, BSNL Chairman Emeritus, TEMA Along with Interaction with BSNL QA LIVE from DELHI 21st July 2020 www.cmai.asia www.tematelecom.in technologically advanced nations. With 250+ R&D engineers, world-class processes and infrastructure, Matrix is committed to designing and manufacturing cutting-edge solutions. This award is a validation of Matrix’s innovation, design and manufacturing capabilities and will go a long way in motivating us towards building world-class technology solutions.” SecurityLink India | August 2020 | www.securitylinkindia.com 27
National Roundup Kolkata’s Largest Business Club Makes a Move from Reactive to Proactive Surveillance Commenced in 2016, the largest business club was built component of the successful operations at the site. The cus- with smart infrastructure and modern amenities, in the tomer has been relying heavily on analog video surveillance futuristic town of Kolkata, to provide leisure-cum-business to secure its facilities and workforce. Due to its limited scala- conducive atmosphere to their members and visitors. The bility, there was no way to do real-time surveillance through- contemporary building of business club is spread over 10 out the premises. Moreover, every incident recorded by the acres area and serves as a cultural, commercial, and business video cameras required time-consuming manual investiga- hub in the region. Having beautiful landscape, it attained tre- tion, therefore, causing delay in decision-making. mendous popularity due to its high-end specifications, green landscape, wedding lawn, tennis court, cafeteria, business The solution center to name a few. Aiming to advancing the surveillance solution, the cus- The challenge tomer wanted to make an investment to maintain a watchful eye, manage threats/ incidents proactively along With a consistently large volume of patrons visiting the with integrating the existing and new system into the unified business club for various events, security is the vital interface. After a thorough evaluation of various solutions 28 SecurityLink India | August 2020 | www.securitylinkindia.com offered by various companies, it was Videonetics that came out on top. Thanks to Videonetics Unified Video Computing Plat- form (UVCP™) that blends intel- ligent video management soft- ware (VMS), intelligent video analytics and seamless integra- tion of existing analog system into one user-friendly solution, able to grow effortlessly with customers’ need over time. 1. 24x7 security with granular details & incident response management: T o d a y , Videonetics intelligent VMS is managing 100+ cameras includ- ing PTZ network cameras, dome cameras, fixed cameras, and bul- let cameras, installed throughout the interior as well as exterior of the premises. In addition, 32 leg-
National Roundup acy analog cameras are also integrated into the unified To go from conventional to a professional solution, eventually providing centralized control of the cameras to the security operators. The in-built failover and scalable surveillance system was a huge and redundancy features of Intelligent VMS ensure the improvement for our client. It has enhanced our operators always have access to live and recorded video. client’s reputation for providing safe and secure This means if any incident occurs, they can always have environment to visitors, employees, and members. evidence of it. Commendation to Videonetics for providing their unified video computing platform that empowered 2. Zero blind spot at entrance & surroundings: The in- security operators by improving their efficiency in telligent video analytics (IVA) is helping operators to monitoring the premise and handling threats swiftly. detect vehicles which are wrongly parked in ‘restricted’ I deeply appreciate their dedication and untiring or ‘no parking’ zones, at the outside of premise. For the perimeter security at entry & exit gates, the PTZ cam- efforts for making it a reality era tracking helps in detecting unusual behaviour of the person and provides alert to security operators for Gaurav Das faster action. At the entrance, face capture has been in- stalled to detect a person in the scene and locates his/her Director, Webdesk Technologies Private Limited face, which is saved in the database, indexed and time stamped. In addition, vehicle capture is deployed to track has been deployed that estimates density of people in and record license plates of vehicles along with time and a scene and generates an alert as soon as the density date, entering the premise. in any defined area crosses a certain limit. 3. Watchful eyes at business club facilities: The business 4. Empowering officials with web and mobile applica- club needed a solution that could help it identify theft, tion: The ease of use of Videonetics unified solution has intrusion and trespassing throughout its facilities. In the been instrumental to the business club. The operators first phase of the project, Videonetics along with stake- and senior authorities are efficiently accessing videos holders of business club and system integrator identified anytime and anywhere, through an intuitive interface of sensitive areas, that required immediate security. IVMS web and mobile applications. At the time of inci- ● To monitor suspicious activities, zone monitoring dents, operators can handle alarms and manage events, has been enabled at the fence of the tennis court, therefore, reducing manual checks of cases and helping lawn, emergency gates and open field area. Opera- to expedite investigations. tors will be notified if a person stays beyond a certain duration in a user-marked zone. The Impact ● To combat unauthorized entry in the generator room, operators gets alert if any intrusion happens in a Prior to the installation of Videonetics solution, the IT marked area. Similarly, unusual activities are also Park relied on manned security to address security being monitored in this area through loitering detec- of workforce and property. Now, all key zones inside and tion. outside the ITpark have been placed under ‘intelligent’ ● At the peripheries of the business club, trespassing surveillance round-the-clock, which allows the system to detection has been deployed to detect if any person immediately react to any unusual situations. The deploy- intrudes into the premise. The system is well capable ment has significantly improved service effectiveness, to trace trajectory of the trespasser and prevent an simplified the coordination with other departments, short- incident before it occurs. ened the response time, and increased the operational ef- ● The authorities wanted to have alert in case any mob ficiency. formation happens at the field area, known as forbid- den region of the club. Crowd formation detection SecurityLink India | August 2020 | www.securitylinkindia.com 29
National Roundup D3 Appoints RAH Infotech as National Distributor of NextGen SOAR for India Partnership is tailored to meet the security orchestration, automation and response needs of Indian organisations RAH Infotech, the specialty technology distributor of With security architecture be- cybersecurity, data management, disaster recovery and cloud solution has recently partnered with D3 Security, pro- coming core to an organisation’s vider of the leading next-generation security orchestration, overall functionality, an automat- automation, and response (SOAR) platform, to distribute ed detection and corresponding D3’s advanced SOAR capabilities with the built-in MITRE response system offers an edge ATT&CK Matrix solution in India. over other security solutions. D3 is a leader in the SOAR solutions As a national distributor, RAH Infotech will leverage its and we are quite excited to have technological prowess and massive reach to offer D3’s SOAR partnered with them. This partnership with D3 Security platform to customers in India to strengthen their enterprise is another testament of our continuous effort to help our security architecture. customers in India strengthening their enterprise security infrastructure. With the Covid pandemic wreaking hav- Every year, more organi- oc across the globe forcing organizations working from home resulting in increased attack surface, this partner- zations around the world are learning the simple fact that ship could not have come at a better time SOAR can make them more se- – Ashis Guha, CEO, RAH Infotech cure, agile, and efficient. We are excited to collaborate with RAH viding world class IT solutions to a large number of channel Infotech to bring those benefits partners and corporates in India and SAARC countries. to their customers as one of the tools they deploy in the fight against cybersecurity RAH Infotech is the fastest growing value-added distrib- utor in India possessing 15 years of expertise in providing threats information management and security solutions to a large – Suneel Rangamani, Sales Director, D3 Security number of customers across the country through its part- nership with over 20 OEMs and over 500 channel partners. D3 Security’s mission is to make security operations, in- Headquartered in New Delhi, RAH Infotech has presence cident response, and threat hunting dramatically easier and across the country with International presence in Nether- faster. Today’s SOAR market faces huge challenges around lands, Singapore, the UK and the USA. managing playbook lifecycles and product integrations. D3 Security’s NextGen SOAR Platform leads the way with 260+ D3 Security’s NextGen SOAR platform is the first and product integrations and a low-code/ no-code interface that only ‘SOAR 2.0’ platform that combines automation and or- makes it possible to build, adjust, and scale playbooks and chestration with the proactive response capabilities of MI- integrations without extensive Python coding skills. It has TRE ATT&CK. D3’s codeless playbooks bring enrichment, also disrupted the market with built-in MITRE ATT&CK analysis and remediation together, making it easy for anyone TTP automation, enabling SOC operators to see a complete to build, modify and scale workflows, no Python coding re- picture beyond the individual stages of an attack. quired. With hundreds of product integrations and baked in security expertise, customers reduce MTTR up to 99% and RAH Infotech is a specialty value added distributor of improve both the speed and quality of their security opera- mission critical technology solutions including network and tions, incident response and threat hunting. cyber security, disaster recovery and cloud. In over a decade of its operations, RAH Infotech has been consistently pro- 30 SecurityLink India | August 2020 | www.securitylinkindia.com
National Roundup Introduces Orbi Mesh Router RBK852 with Wi-Fi 6 Support to Maximize Network Capacity Combination of Wi-Fi 6 and Mesh is designed to bring the fastest internet speed on devices NETGEAR, the leading provider of 6 aims to deliver on the demand of the belief: Latest generation Wi-Fi 6 the latest and innovative Wi-Fi net- most blazing Wi-Fi Mesh network so technology is faster than ever, with working system has added newest prod- one can easily stay connected without 4x increased capacity compared to a uct to its existing Wi-Fi Mesh technol- any interruptions. Wi-Fi 5 (802.11ac) system. ogy lineup to tackle the dead spots and ●● Seamless and consistent Mesh daily networking challenges. The new The NETGEAR Orbi Wi-Fi 6 two- Wi-Fi coverage: From front door Wi-Fi 6 AX6000 Tri-band Mesh System pack promises a coverage area of 5,000 to backyard and in every corner of a (RBK852) joins the Orbi Mesh lineup, square feet (about 465 square meters), home. A dedicated quad-stream Wi- the company’s existing flagship system and there are four wired Ethernet con- Fi 6 backhaul allows up to four data at an attractive price point. nections on each satellite as well as streams on each band. the main router. The Orbi Wi-Fi 6 uses ●● Multi-Gigabit internet speeds The next-gen Orbi Wi-Fi 6 Mesh Sys- NETGEAR’s tri-band mesh technology ready: 2.5Gbps Ethernet port sup- tem is designed for the connected world and has both 2.4GHz and 5GHz front port multi-gigabit Internet speeds of today and the future. The RBK852 is a haul along with a 5GHz backhaul. available from service providers. combination of two biggest technologies ●● Connect more wired devices: 4 Gi- for wireless home networking i.e., Mesh Specifications gabit Ethernet LAN ports on each and Wi-Fi 6. The Mesh technology has router and satellite is ideal for home been around for a while but the Wi-Fi 6 is ●● Ultimate performance whole offices or home entertainment areas. still relatively new, over the next year or home Mesh Wi-Fi system: Covers ●● Works with Amazon Alexa and the so, many devices will see the new wire- large homes up to 5,000sq.ft with Google Assistant so one can use less standard show up more and more fast Wi-Fi. System includes a Wi-Fi voice commands to control home as Wi-Fi 6 the future now. Households router and one satellite. Wi-Fi network. now have a multitude of always-on and Speaking on the development, always-connected smart home devices ●● Powerful AX Mesh Wi-Fi system: Marthesh Nagendra, Country Manag- many of which are running high-band- Keeps all connections strong in er India, ME & SAARC, NETGEAR width applications like streaming 4K/ 8K every room, all the time. Enjoy 4K/ commented, “At NETGEAR, we aim Ultimate HD connections across multiple 8K UHD streaming and online gam- to provide a broad range of advanced screens. The Orbi Wi-Fi 6 mesh system ing to multiple screens simultane- Wi-Fi solutions to address the needs of has the capacity to support the traffic ously without interruption. the ever-evolving consumer landscape. generated by the multitude of connected Looking at the current scenario, where devices that are in the home today and for ●● Wi-Fi 6 brings capacity beyond home networks are constrained by each years to come. and every household member working from their home, learning, or simply The new addition to NETGEAR’s streaming videos. The latest Wi-Fi 6 mesh family will set a new bar for the Mesh technology aims to future-proof performance and capacity to meet the your home network with the latest wire- increasing demands of our customers less standard that can offer up to 4 times especially during the recent times. Since more capacity for connections then the there is no end for the number of the previous connections.” connected consumer devices being in- troduced in the market, the Orbi Wi-Fi SecurityLink India | August 2020 | www.securitylinkindia.com 31
National Roundup It’s Time to Concentrate on Strengthening Web Application Firewalls (WAF) In the COVID-19 era, while remote Most vulnerabilities in web applications are a working has become the new norm, security breaches have also dominated result of developer errors. Traditional scanners, in- the headlines. This has made organiza- trusion detection or prevention systems (IDS/ IPS) tions look beyond traditional network and firewalls can’t always detect these advance security like the firewall to protect their web application attacks. This is where Array’s WAF web applications. No longer can securi- supports organizations in providing 360-degree ty for web applications be ignored and protection with no excuse for web attacks and also to overcome the challenges posed by the ensuring continuity and high availability of web ap- new waves of security threats organiza- plications while reducing security risks. This form tions need to focus on bettering their web of security branches out to provide robust protection for users, especially application security. A WAF protects web applications from a variety of ap- helping those with remote access plication layer attacks such as cross-site scripting (XSS), SQL injection (SQLi), – Shibu Paul, Vice President, International Sales at Array Networks brute-force attacks, distributed denial of service attacks (DDoS) and cookie poi- scheme with many specialized modules WAF, which then detects potential soning among others. These attacks re- to provide precise and impenetrable pro- threats and alerts the existing secu- sult in breaches leading to direct access tection of web, mobile and ERP appli- rity systems. of users’ valuable data. With the right cations. It not only detects the complex ●● Offline mode is another option WAF in place, users can block an array web application attacks but also blocks where the WAF examines logs for of attacks that aim to ex-filtrate that data the attack traffic in real-time without af- evidence of previous attacks for fo- by compromising their systems. This is fecting the normal flow of business data rensic analysis. one reason why analysts believe that the traffic. In short, Array’s WAF is cus- WAF market will show a high growth tom-built to adapt across the data centers rate of more than 18.50% for a forecast But, why is Array’s WAF or the cloud. By using WAF, organiza- period of 2018-2025. unique? tions can protect businesses intellectual property, protect client details, which in The WAF protects web applications ●● Array’s WAF can be deployed at a turn, protect the organization’s reputa- by filtering, monitoring and blocking cloud as well as a virtual function on tion, revenue and help in avoiding legal any malicious HTTP/S traffic travelling a dedicated hardware appliance of action. to the web application and prevents any Array’s AVX Series which ensures To sum it up, while inducting a unauthorized data from leaving the ap- guaranteed performance. WAF, organizations need to make sure plication. It does this by adhering to a set that they are protecting their entire ap- of policies that help determine what traf- ●● It provides Advanced L7 DDoS pro- plication ecosystem. Organizations fic is malicious and what traffic is safe. tection. have many times ignored the front-end This is where Array’s AVX series helps and only concentrated on protecting organizations in decreasing the oppor- ●● It handles grey traffic with unsuper- the back-end of web applications and tunity of facing undesirable web secu- vised machine learning. without proper protection, attackers will rity issues. It uses a multilayer defence target server assets through the exposed ●● It can be deployed via in-line mode web applications. where the traffic is routed through the Array’s WAF. ●● Mirror mode can be used where a router mirrors traffic to Array’s 32 SecurityLink India | August 2020 | www.securitylinkindia.com
National Roundup Frost & Sullivan Identifies New Growth Opportunities in a Contracting Global Economy Cross-industry collaboration, reduced taxes, and low interest rates key to expediting recovery from the economic slump Frost & Sullivan’s recent analysis, New Trade well-positioned to grow in 2020, given the increased demand and Supply Chain Mega Trends to Transform and government incentives for such industries.” the Global Economy in 2020, predicts that the destabilizing impact of the COVID-19 pandemic For further revenue opportunities, global businesses on the macroeconomic fundamentals will cause and industries should: the global economy to contract by 3.6% in 2020. ●● Relocate production from China to other emerging mar- Major European and American economies are forecast to witness contraction much deeper than ket alternatives such as Vietnam, Thailand and Indonesia 6%, whereas the Chinese economy is expected to to leverage government incentives and other strategic grow by 1.3%. The global economy will most like- advantages. ly begin to recover from the impact of the pandem- ●● Look for cross-industry M&A opportunities within the ic by 2021, boosted by hefty stimulus packages private sector and increase public-private partnerships to and stringent fiscal measures. Additional efforts meet the vast unmet demand gap for technologically ad- by governments of affected nations such as lowered in- vanced solutions to transition to the new normal. terest rates and extended loan moratoriums, are also ex- ●● Offer diversified and customized price plans for their ser- pected to help beleaguered industries find a footing during vices and products that fit the needs of consumers of var- these tumultuous times. ying economic strata as opposed to standardized options. ●● Leverage the historically low interest rates on credits to “The global economy has already witnessed shallow increase investments and optimize government tax in- V-shaped recovery from most historical health shocks such centives to invest in new product development and sup- as SARS and MERS,” said Sambhavy Shrestha, Economist, ply chain realignment. Emerging Market Innovation (EMI) Practice at Frost & Sul- New Trade and Supply Chain Mega Trends to Transform livan, “While a wide V-shaped recovery from the COVID-19 the Global Economy in 2020 is part of Frost & Sullivan’s crisis is expected, the delayed revival of global consumer de- global Emerging Market Innovation Growth Partnership Ser- mand will deter quick recovery of business sentiments and vice program. unemployment rates. As early signs of recovery in the global economy emerged by the end of Q2 2020 with easing lock- SecurityLink India | August 2020 | www.securitylinkindia.com 33 downs, historically high levels of government spending will remain pivotal for faster recovery.” Shrestha added, “With the larger economy expected to remain contracted throughout 2020 and growth recovery to pre-crisis levels expected only in 2022, businesses need to adapt to long-term shifts in consumer spending patterns and workforce transformation. Export-oriented economies will face a severe decrease in demand and consequent reduction in government revenues, even after signs of global economic revival. Telehealth and similar minimum-contact services are
National Roundup HID Global Expands Biometric Identity Verification to Police Forces and Military Installations Around the Globe HID Global recently an- timized with the latest, best-in- fied and more than $600,000 in nounced the expansion class capabilities to create safer savings. of its biometrics identification societies is key to our mission as management solutions to police a global leader in trusted iden- Extending biometrics to departments and military instal- tities.” military applications lations around the globe. The HID NOMAD 30 Pock- As a leader in mobile biome- A large police force that cov- et Reader’s PIV-certified sensor trics, HID Global also pro- ers a major capital city in Eu- enables end-users such as law vides a broad range of biometric rope is using its HID NOMAD™ 30 enforcement officers to quickly identity management solutions Pocket Reader for rapid suspect capture and verify single fin- to customers beyond law en- identification in the field. Initial- gerprints against databases and forcement. One of the company’s ly launched for Android™ plat- eliminates the need to transport many offerings include the HID forms, the solution’s SDK is now suspects to a central booking sta- SEEK™ Avenger rugged hand-held available for iOS devices. This tion. biometric reader that is used in extends Bring-Your-Own-Device military applications to accurate- (BYOD) benefits to a wider scope With Android and iOS avail- ly identify individuals. The solu- of clients who seek a truly flex- ability driving wider adoption, tion captures high-quality finger- ible and mobile single-finger- officers can simply pair their prints and IAP-40 compliant iris print verification solution. own mobile devices with the images for verification against as biometric reader hardware many as 250,000 records and of- “The expansion of our of- and perform watchlist match- fers offline functionality in harsh fering to include iOS platforms ing within minutes while in environments where connectivi- broadens the adaptability the field, leaving custody space ty is compromised. and application of our mobile open for confirmed offenders. biometric solutions and equips The HID NOMAD 30 Pocket HID recently extended the our customers – from law en- Reader’s rapid identification HID SEEK Avenger biometric forcement to military officials capabilities offer improved op- reader with several features – with the confidence to achieve erational efficiency and reduce such as support for Windows 10, rapid identification anywhere,” time and booking costs associ- an upgraded camera, double the said Jessica Westerouen van ated with processing a suspect memory and hard drive capacity Meeteren, VP & Managing Di- in a police station. During the for enhanced speed and perfor- rector, Citizen Identity with HID first year of deployment, one mance, which expands upon its Global, “Ensuring that our port- city saw a six-fold increase in powerful watchlist matching ca- folio of proven solutions is op- the number of suspects identi- pabilities. 34 SecurityLink India | August 2020 | www.securitylinkindia.com
National Roundup Videonetics Joins The Qualcomm Smart Cities Accelerator Program Videonetics has joined the Qualcomm®Smart Cities Ac- We are excited to join the Qualcomm Smart celerator Program to provide their AI and deep learn- Cities Accelerator Program. Our platform has been ing powered Unified Video Computing Platform™ (UVCP) field-proven in providing end-to-end solutions from to diverse industries such as smart cities, aviation, enterprise edge devices to cloud hosted services globally. As and manufacturing to name a few. To exhibit their features a member of the program, I am assured that Qual- and functionalities, Videonetics will be implementing their comm Technologies’ remarkable intelligent network end-to-end video management system and AI enabled video connectivity, combined with Videonetics’s state-of- analytics in conjunction with Qualcomm Technologies ena- the-art solutions will cater to growing demand for bled smart cameras for use at Qualcomm Technologies’ San Diego Morehouse campus. truly unified solutions in different verticals We are excited to have Videonetics joined the – Avinash Trivedi Qualcomm Smart Cities Accelerator Program and VP, Business Development, Videonetics share their solutions as their participation and expertise in AI and deep learning. Both companies cludes Qualcomm Technologies’ portfolio of industry lead- ing IoT solutions with advancements in mobile connectivity, working together, with Qualcomm’s experience edge computing and AI capabilities to address a diverse in wireless and AI, will facilitate an end-to-end range of smart city needs and provides priority access of solution for a variety of applications across multiple co-marketing opportunities to its member companies. verticals and industries Videonetics will leverage participation in the Qual- comm Smart Cities Accelerator Program to deploy advanced – Sanjeet Pandit technologies across cities, municipalities, industries, avi- ation, mass transportation, education, and healthcare for a Senior Director, Business Development well-connected infrastructure. Qualcomm Technologies, Inc. Acclaimed as the leading market player, Videonetics has As part of the Qualcomm® Advantage Network, the secured more than 140 cities, 80+ airports, and 100+ large Qualcomm Smart Cities Accelerator Program is designed enterprises across many geographies. Powered by its patent- to connect cities, municipalities, government agencies, and ed and awarded AI and deep learning framework, Videonetics enterprises with an ecosystem of providers to help deliver Unified Video Computing Platform encompasses intelligent greater efficiencies, cost savings, safety, and sustainability. VMS, video analytics, intelligent traffic management sys- With proven expertise in commercially deployed solutions, tem, facial recognition, video computing platform as a ser- it provides members with end-to-end smart city solutions, vice (VCPaaS™) and video command control center. which are essential for the transformation of city infrastruc- ture. The Qualcomm Smart Cities Accelerator Program in- SecurityLink India | August 2020 | www.securitylinkindia.com 35
feature Make it Smarter Four Ways to Enhance a Security System (Submitted by Prama Hikvision India) Making a security system smarter is much easier than cle intrusions day and night. If an intruder enters an area of one can imagine. By focusing on a few key elements, attention, an alarm will be triggered, and simultaneously it becomes straightforward and worthwhile in the long run – the onsite camera produces a flashing light and an auditory it makes operations more streamlined and efficient, it aggre- warning – which can be pre-recorded – with the aim of de- gates all you need in the palm of your hand, and it generates terring the intruder. At the same time, security personnel is powerful security insights. notified on the monitor with a video clip displaying what is happening. Accordingly, actions can be taken straight away. Think about proactive security In this way, facilities can protect their assets with more con- fidence. Atraditional video security system works by passive monitoring, which means it is referred to after inci- When it comes to forensic search dents happen. Why? Usually there is limited or no intelli- gence to detect a true intrusion event, and so too many alerts Now that the system enables immediate response, atten- are triggered compounding the genuine and insignificant tion can be paid to using it for forensic search. Most events together. This is a reality that makes it tough for secu- of the video recorded on an NVR or DVR is rarely viewed. rity personnel to focus and act. A smarter security system that precisely identifies tres- passing events and deters the intruders at the very beginning, can transform passive monitoring to proactive security. One example is the Hikvision AcuSense technology. What does smart look like? Facilities are equipped with cameras featuring AcuSense technology, so they are enabled to detect human/ vehi- 36 SecurityLink India | August 2020 | www.securitylinkindia.com
feature But, when the time comes that a short piece of video is need- System convergence allows flexible linkage across var- ed, operators are faced with thousands of hours of recorded ious devices, giving the user choice to customize to their video. A smart search of video archives can greatly simpli- needs in different scenarios. With Prama Hikvision’s latest fy the task and help an investigator quickly find evidence offering – Hik-ProConnect, it can easily boost your security of an event. The solutions can be found in intelligent video with more convenience. analytics, for example human and vehicle detection, license plate recognition and other powerful features. Powerful insights beyond security One of Prama Hikvision’s offerings is the DeepinMind When the security operation is successfully stream- NVR. This can effectively identify people separately from lined, business operation insights can come next. Ex- other objects such as animals or leaves captured by security amples could be people counting, queue detection, and heat cameras. So, as soon as there’s a line-crossing detection by mapping technologies. Today’s dual-lens smart people count- a person, the NVR recognizes it and starts to record, fur- ing cameras can accurately track customer flow and num- ther categorizing that video clip with a label for convenient bers, helping retailers adjust staffing level in different times; search. In this way, investigators looking for evidence of while heat mapping cameras help understand the hot spots an intruder’s trespass, can simply specify the line-crossing throughout the shop floor and optimize layout. Furthermore, search criteria, and choose the category labelled human queue detection cameras can be placed to monitor queues in events. The system will quickly show all the relevant videos. real-time, helping retailers manage their checkout lines. All of these methods work to increase operational efficiency and Smarter with convergence enhance in-store shopping experience. The majority of security systems used to be stand-alone The solution can be achieved using intelligent video – in other words, they were built to work in an independ- cameras like Prama Hikvision DeepinView series, at the ent and self-contained way. But users needed to access and same time, a well-performed VMS like Prama Hikvision’s manage each system with respective platforms and logins. If HikCentral manages all of the information sent by cameras you take the next step to get a converged system, the unified and generates reports for retailers to see and react. The Hik- solution can bring security to a whole new level. Central employs various business intelligence (BI) modules to suit a variety of applications such as facial recognition and A smarter, unified security solution allows users to ac- people counting analysis. It integrates with most other Prama cess all the security devices in one platform, covering vid- Hikvision products, including IP cameras, and can also inte- eo cameras, access control, intercom, alarm equipment and grate with third-party systems and cameras. more. As a bonus, since these systems are converged, users can set rules for event types, time schedules and triggered ac- SecurityLink India | August 2020 | www.securitylinkindia.com 37 tions, such as link alerts to the output of a particular camera that is capturing the security breach.
feature Is Security Responsible for the Delay in Deployment of 5G Connectivity? By Sanjai Gangadharan Regional Director, SAARC, A10 Networks Since the beginning of the current pandemic, false and cost-efficient security solutions that offer flexibility, scala- unsubstantiated rumours of 5G and its impact on peo- bility, and protection as they evolve their networks to 5G and ple’s health have been prevalent in social media. Phone masts integrate cloud and edge capabilities. This means a compre- have reportedly been damaged or destroyed in several Euro- hensive security stack at service provider scale with other pean countries. The problem has been particularly acute in functions most needed in mobile networks, including a fire- the UK, where dozens of towers were targeted, and engineers wall for all network peering points, deep packet inspection abused as they worked, according to media reports. (DPI), carrier-grade network address translation (CGNAT) and IPv6 migration, integrated distributed denial of service The scale of the problem prompted the World Health (DDoS) threat protection, intelligent traffic steering and Organisation (WHO), the UN agency which is leading the analytics. response to the pandemic, to add the 5G conspiracy to its COVID-19 myth busters article, which highlighted that “vi- Below is a blueprint of five of the key solutions required ruses cannot travel on radio waves/ mobile networks. COV- for a successful migration to 5G. ID-19 is spreading in many countries that do not have 5G mobile networks.” 1. Gi-LAN Security – Gi/ SGi Firewall In the midst of this controversy, A10 Networks released Significant threats to mobile subscribers and networks a report titled, ‘Toward a More Secure 5G World,’ which come through the internet interface – the Gi/ SGi. As highlighted how COVID-19 may result in some short-term traffic volume, devices and cybercriminal expertise in- delays for operators, but ultimately it demonstrates a glob- creases, so do these threats. An integrated Gi/ SGi firewall al need for higher speed, higher capacity 5G networks and protects infrastructure and subscribers and delivers the per- the applications and use cases they enable. The study also formance that mobile carriers require. The Gi/ SGi firewall found that 81% believe industry progress toward 5G is solution meets both current and future traffic requirements moving rapidly, mostly in major markets, or is at least in for any service provider. This comprehensive and consolidat- line with expectations. ed approach provides best-in-class performance, efficiency and scale to protect the mobile infrastructure while reducing Whilst the report shows 5G adoption is scaling rapidly, OPEX and CAPEX costs. Service providers can also use a one of the main concerns from the report was surrounding Gi/ SGi firewall solution in a virtual form factor to gain a cybersecurity. As 5G networks expand, so does the explo- flexible, easy-to-deploy and on-demand, software-based de- sive growth in network traffic, connected devices, and mis- ployment. sion-critical IoT use cases. This will impact network security and reliability more than ever before. The report supported 2. Mobile Roaming Security – GTP Firewall this view, with 99% respondents expecting 5G networks will increase security and reliability concerns and 93% have or The GTP protocol used in the roaming and other EPC may change security investments in light of 5G. interfaces has known vulnerabilities that can be read- To address this challenge, service providers need highly 38 SecurityLink India | August 2020 | www.securitylinkindia.com
feature ily exploited by malicious actors. Operators must meet the from any network peering point and include both volumet- growing security challenges while also providing a seamless ric and lower volume, sophisticated attacks against specific subscriber experience – wherever they travel, whatever de- network elements or important applications of key enterprise vices they use, and whatever network is accessed. A GTP customers. Over-provisioning of network elements to meet firewall provides extensive capabilities including stateful rising threat volume or simply blocking traffic during an at- inspection, rate limiting, and filtering of traffic for protocol tack increases costs and can result in service denial for criti- abnormalities, invalid messages, and other suspicious indi- cal traffic. Operators need a more cost-efficient and compre- cators. It protects against GTP protocol vulnerabilities such hensive approach that quickly detects and mitigates DDoS as fraudulent use, confidentiality breaches, DDoS attacks and infrastructure attacks across the entire mobile network by malicious peers and other threats. A GTP firewall can be without denying service to important traffic. Service provid- inserted into multiple interfaces carrying the GTP traffic. ers can achieve full DDoS resilience and improve security by In the primary use case, it is inserted on S5-Gn and S8-Gp using a layered approach for detecting and mitigating attacks (roaming) interfaces. The GTP firewall provides scalability of all types and sizes before attackers take down their targets. and supports uninterrupted operations while protecting sub- scribers and the mobile core against GTP-based threats such 5. Secure, Efficient MEC as information leaks, malicious packet attacks, fraud and DDoS attacks through GTP interfaces in the access networks Multi-access Edge Compute (MEC) architecture is of- and GRX/ IPX interconnect. ten part of the 5G transition plan. In a MEC archi- tecture, network traffic processing functions move from a 3. Network Slicing – Intelligent Traffic centralised data centre or mobile core to a number of distri- Steering bution points that are located closer to the user at the ‘edge.’ A distributed architecture with thousands of nodes increases Network slicing will allow mobile operators to offer se- management difficulty and requires a high level of automa- curity and other capabilities tailored to each vertical tion and analytics for deployment, management and security application and to capture revenue from these diverse use and operational changes. We at A10 Networks offer a Thun- cases, without losing the economies of scale of common der CFW solution that offers high performance, low laten- infrastructure. Network slicing isolates each use case or cy in a software-based or hardware form factor for firewall, service from one another so that the services can be inde- CGNAT and IPv6 migration, traffic steering and other func- pendently deployed, managed securely, and delivered in a tions. Many functions that may have been provided by single robust way. This solution identifies specific types of traffic point appliances are combined into one appliance, virtual by multiple criteria including radio access type, IP address, instance, bare metal or container. Cost-efficient, high-per- DNS address, device type, destination, subscriber ID, and formance security is ensured without exceeding space and other parameters and then redirects these ‘slices’ of traffic to power limitations. Centralised management and analytics value-added service platforms such as protection platforms simplify operations for lower TCO. for deeper threat analysis and scrubbing. This re-direction can be based on either static policy or dynamic factors. This As we reach the halfway point of 2020, the A10 study solution enables differentiated treatment to the developing indicates that major mobile carriers around the world are on 5G use cases, deepens the security posture and boosts reve- track with their 5G plans, and more expect to begin commer- nue opportunity without adding unnecessary inspection load cial build-outs in the coming months. That means mobile op- on the entire network. erators globally need to proactively prepare for the demands of a new virtualised and secure 5G world. That means boost- 4. Network Wide DDoS Detection and ing security at key protection points like the mobile edge, de- Mitigation System ploying a cloud-native infrastructure, consolidating network functions, leveraging new CI/ CD integrations and DevOps Mobile operators must maintain high network availabil- automation tools, and moving to an agile and hyper-scale ity at all times. DDoS attacks target mobile networks service-based architecture as much as possible. All these and their subscribers with high volume message floods that improvements will pay dividends immediately with existing overwhelm infrastructure and can cause service degradation networks and move carriers closer to their ultimate goals for and network outages. Now, targeted attacks can also come broader 5G adoption. SecurityLink India | August 2020 | www.securitylinkindia.com 39
Application/ case study Early-warning Fire Alarm for Mercedes-Benz Car Manufacturing Plant Aspirating smoke detection secures the automotive production facility in Russia Located 40 kilometres outside the Russian capital, the The reason – Conventional point-type fire detectors new Mercedes-Benz passenger car factory is a show- exceed their performance limit when it comes to detecting case for Industry 4.0 automotive manufacturing. To ensure smoke particles inside such a vast, air-conditioned space. the safety of more than 1,000 employees at the massive facil- Working closely with the client, Bosch experts realized that ity, Bosch provided a fire alarm and security system, replete early fire detection would take a solution just as innovative with voice evacuation capabilities to meet the specific safety as the futuristic car factory itself. Additionally, Mercedes- needs of modern-day car factories. Benz required a centrally controlled combination of intru- sion alarm and video security to guard the entire perimeter of Walking into the main manufacturing hall of the new the 85-hectare facility with its total of seven buildings; and Mercedes-Benz cars plant in the Moscow region is to see could the solution be ready within a few weeks for the plant’s the future of automotive production. Amid glass walls and grand opening featuring international dignitaries? high ceilings, robots and humans work side-by side to as- semble the company’s most popular limousines for the Rus- The future of car manufacturing sian market. From chassis welding to windshield installation to painting, the plant combines all production steps in the “The Mercedes-Benz project is an important reference for same building as part of a ‘one-roof concept.’ But from a fire us. It shows the level of integration and customer focus safety perspective, the ‘one-roof concept’ with its tall factory made possible by Bosch solutions. Our system has succeed- ceilings and open floor-plan poses challenges. ed in meeting the specific needs of automobile manufactur- 40 SecurityLink India | August 2020 | www.securitylinkindia.com
application/ case study ers in the next generation of car production facilities,” said loudspeakers are certified according to the fire evacuation Ivan Konukhin, Bosch Security and Safety Systems Russia. EN54-24 standard for reliable performance under emer- gency conditions. Overall, this level of audio sound quality Safety for automotive factories directly serves to keep workers secure and informed, espe- cially if evacuation becomes necessary. Working on a tight timeline, the Bosch team selected a fitting smoke detection technology – aspirating smoke In the bigger picture, the total of 248 aspirating detec- detectors. Perfectly suited for large warehouses, the detection tors inside the main production hall are centrally networked units are located within a pipe system that constantly ‘in- via Modular Fire Panels 5000 series and connected to more hales’ samples of air, which are checked for smoke particles than 2,500 automatic fire detectors installed throughout six via intelligent signal processing technology. As a result, the additional administrative buildings on the premises. For light-based detectors achieve smoke sensitivities as precise as maximum employee safety, clear voice and audio alarm is 0.05%. They can detect fires in the beginning stages (called the provided by the PRAESIDEO digital public address and ‘smouldering’ phase) even before visible smoke is released. voice alarm system. With Smart Safety Link, the interfaced Aspirating detectors also pinpoint the exact location of fires, fire and voice alarm system offers a full control in case of thus reliably preventing major damage in most cases. The sys- emergency, including the customization of the fire verifica- tion time and the automatic process that can ensure a safe tem also suppresses environmental factors that typically cause phased evacuation. false alarms in car factories, including dust, flying sparks and electrical interference for maximum reliability. To ensure full visibility of the premises and around-theclock safety, the video security solution con- Amid the acoustic conditions inside the vast produc- sists of 112 high-definition cameras from Bosch. While tion plant, a total of 650 horn and ceiling loudspeakers bullet and moving cameras secure the perimeter, dome from Bosch deliver sufficient volume and intelligibility. cameras monitor inside spaces. Integrated on the Bosch The horn speakers offer a wide opening angle to broadcast video management system (BVMS), all cameras can be sound across factory floors while offering protection from controlled centrally by the on-site security team inside water and dust, as well as the corrosive effects of indus- the control room. Bringing security full-circle, the video trial environments. What’s more, the ceiling loudspeakers system has a direct interface with intrusion alarm system are equipped with a metal fire dome to adapt to the in- containing over 200 detectors air handling spaces of the automotive plant. The cabinet This seamless integration of all solutions on the building integration system (BIS) from Bosch enables a host of addi- tional functions – for instance, the system alerts the control room when a fire detector is triggered and sends live images from the nearest camera for full situational awareness. As Ivan Konukhin at the Regional Representative Center North- West and South Russia at Bosch Security Systems explained, “The cooperative functionalities between BIS and BVMS components were programmed according to customer re- quirements in an uncomplicated manner via macros, which also supported a timely installation.” SecurityLink India | August 2020 | www.securitylinkindia.com 41
Application/ case study Centralized Video Management Helps Holy Rosary Credit Union New Hampshire financial institution saves time by upgrading to a state-of-the-art March Networks video surveillance system Ken Mauser isn’t the least bit nostalgic about the vid- It’s just so much easier with eo surveillance system he inherited upon joining the Holy Rosary Credit Union (HRCU) in New Hampshire in March Networks than it was 2015. Lacking centralized management capability, the sys- tem required Mauser, Chief Information Officer, to get in with our previous vendor his car and drive to a branch or remote ATM to export video evidence. Ken Mauser HRCU Chief Information Officer “We would have to go to a remote ATM, for example, and literally open it up in the middle of a parking lot. Then The search for a new video system for HRCU began as we would connect a laptop to the recorder and save the clip part of a major renovation of the credit union’s main branch to a USB stick. It was a very challenging system to manage.” and head office, recalled Mauser. “We figured it would also After upgrading to a state-of-the-art March Networks be a good time to take a look at the video video surveillance system, Mauser is now able to export vid- surveillance system, so we got in touch eo from the same remote ATM or any of the credit union’s with our supplier, Portland Safe, and five branches right from his office in Rochester. they brought in someone from March Networks to show us their technology.” 42 SecurityLink India | August 2020 | www.securitylinkindia.com The desired functionality “It was a great presentation. We learned that we could centrally manage everything, which was exactly the func- tionality we were looking for. We learned we could also set up logical camera views for anyone in the organization without any licensing issues.” “The branch managers could have access to all of their cameras and the in- teractive teller machine (ITM) operators could access cameras showing all of the ITM views. That way they would know
application/ case study how long the lines were. It was very versatile. We “The primary use is for security,” noted Mauser, looked briefly at a system from our previous ven- “We’ve had robberies here in the past. We captured some dor, but it wasn’t very impressive.” excellent quality video from one incident a few years ago and shared it with police. They said, ‘We know that guy. HRCU’s technology has come a long way since We’ll find him.’ And, sure enough, they picked him up a it was founded in 1962. At that time, a small group few days later.” of parishioners used a little lock box in the base- ment of Our Lady of the Holy Rosary Church in The system is also used to produce video evidence of Rochester to take deposits and make loans to mem- fraudulent transactions and investigate liability claims. bers of the community. Today, with 22,000 mem- bers and $310 million in assets, HRCU offers a full Altogether, between 15 and 20 credit union personnel range of financial services to the communities it have access to the March Networks system. That includes the serves and, in keeping with its origins as a faith- branch managers, eight members of the ITM team, as well as based organization, leads by example through com- compliance staff, IT and senior management. munity outreach and charitable giving. Easy-to-use solution A much-needed upgrade “The system is very intuitive,” said Mauser, “We never re- No longer in need of that little lock box in the church ally had to show anyone how to use it. It integrates with basement, the credit union now relies on a cutting-edge Microsoft Active Directory, which is another awesome fea- video system for the safety and security of its operations. ture. We just login with our Windows username and pass- word, and the camera views we need are right there. Compli- HRCU completed its technology upgrade branch by ance and IT staff also search for and export video, but that’s branch over a period of several years and is now fully pretty easy as well.” protected by March Networks. The backbone of its sys- tem is March Networks Command Enterprise Software, “If we have a question or require technical support, we which allows the credit union to remotely manage all just pick up the phone and call Portland Safe. They are al- of its cameras and recorders. The 8000 Series Hybrid ways easy to get a hold of and their staff are all very knowl- Networked Video Recorders (NVRs) the credit union ac- edgeable.” quired came in handy during the initial transition as the units can accommodate a mix of IP cameras and legacy Overall, the March Networks solution performs well and analog devices. is easy to use and maintain, meaning Mauser and his team can focus on their day-to-day business. “It was nice that we could set it up in a hybrid fashion so that we didn’t have to replace all of our cameras at once,” “It’s just so much easier with March Networks than it said Mauser. was with our previous vendor,” Mauser said. HRCU eventually retired all of its analog devices, re- SecurityLink India | August 2020 | www.securitylinkindia.com 43 placing them with a variety of March Networks IP cameras, including the compact MegaPX ATM cameras and Oncam 360° cameras. “The 360° cameras are nice because of their increased coverage, which means we don’t have to buy as many cam- eras,” said Mauser, “They work really well. We just go into the software and de-warp the video to see all of the different angles.” Reliability top of mind Areliable video surveillance system is a critical require- ment for protecting the credit union’s members, em- ployees and assets.
Application/ case study & Delivering Comprehensive Video Surveillance Empowering Tampa YMCA to Improve the Member Experience Phased installation will do so much more than just enhance security at over 15 locations 3xLOGIC, Inc.,a leading provider of integrated, intel- stalled while we were closed down and before we opened ligent security solutions recently announced that the Summer Camps.” Tampa (FL) Metropolitan Area YMCA is in the midst of a multi-phase security system project that includes video The 3xLOGIC cameras cover a wide range of areas of surveillance, fire and intrusion upgrades, and a takeover of interest – parking lots, pools, any childcare areas, work- existing and new cameras by 3xLOGIC’s VIGIL video man- out centers, front desks, and basketball courts. Phase II of agement system. The project is being implemented by Red- the project will see fire and intrusion systems upgraded wire, security professionals for over 40 years with clients and monitored by RedWire. “Remote access to the camera across Florida, South Georgia, and Southern Alabama. systems via 3xLOGIC’s View Lite II Mobile App will help us mitigate false alarms.” Phase III of the project will see When Nate Valentin, VP of Information Technology, all cameras – new and previously installed – taken over by joined the Tampa YMCA in September 2019, he was immedi- 3xLOGIC’s VIGIL VMS. “We want everything under one ately presented with an opportunity. “We had received a gen- erous donation to be used for cameras, and I was tasked with interviewing vendors and evaluating platforms to determine how best to leverage this donation.” Valentin and his team de- vised plans to go well beyond standard video surveillance. Prior to this upgrade, the Tampa YMCA had cameras from another manufacturer at three locations. Phase I of the project was to install approximately 150 3xLOGIC cameras at the remaining locations – the smaller buildings received 4-camera packages, most locations have 16, and the larg- est facilities have 20-25 cameras. Valentin commented, “If there’s any silver lining to the current pandemic, Redwire’s excellent work enabled us to get all the camera systems in- 44 SecurityLink India | August 2020 | www.securitylinkindia.com
application/ case study platform and standardized across the Guest Safety in Style organization,” said Valentin. at Luxury Resort During the planning and instal- Guests at the Seminole Hard Rock Hotel & Casino Hollywood enjoy easy lation, Valentin began to see pos- access and unmatched safety thanks to VingCard Essence door locks and sibilities for his system that went VingCard Signature RFID from ASSA ABLOY Global Solutions – combining beyond monitoring parking lots and style with the latest security technology. protecting the YMCA from false claims, “Video is a great tool and it Seminole Hard Rock Hotel & Casino Hollywood, Florida, is a world-re- gives us the information we need to nowned resort including its recently opened 638-room Guitar Hotel and the 168- make good, informed decisions. We room Oasis Tower. The customer needed an integrated solution to ensure guest also saw video and our overall secu- safety and seamless access throughout the resort, with door locks to match its rity system as a way to enhance our upscale accommodation in a modern luxury environment. member’s experience and to increase member engagement.” VingCard Essence door locks, chosen for the Guitar Hotel, encase all elec- tronic components within the door itself, leaving only a sleek door handle and The Tampa YMCA plans to es- RFID/ BLE reader visible, matching the hotel’s unique style. tablish a call center to accomplish these important goals of enhancing The resort opted to install VingCard Signature RFID as part of the refurbish- member engagement and satisfac- ment of the Oasis Tower. Also recognized for its stylish and modern appearance, tion. Call center staff will have ac- Signature RFID is ideal for retrofit projects, ensuring guest safety with the latest cess to live video feeds of key areas security technology. across all YMCA locations so mem- bers can call in to ask, for example, Both VingCard Essence and Signature RFID are equipped with encryption if a basketball court is free or how technology to ensure that only those with authorization are able to gain access many swim lanes are open and any to rooms. This includes advanced anti-keycard cloning abilities and alerts when number of other questions they have someone attempts to use a keycard on multiple doors. Staff can instantly deacti- about the facilities. “Not only will vate keycards that are lost or suspected of being stolen. we be able to give our members up- to-the-minute, accurate information VingCard Essence and Signature RFID are both designed to take future about the status of facilities, this will guest preferences into account with full mobile access compatibility. Properties also take some of the load off front can activate the feature at any time to provide guests with the ability to use per- desk staff so they can better serve sonal devices as a secure guest-room key. the person standing in front of them,” Valentin explained. SecurityLink India | August 2020 | www.securitylinkindia.com 45 Redwire will install fire and in- trusion systems from another manu- facturer, but 3xLOGIC video surveil- lance will be used to verify anything these systems flag. Redwire will per- form fire and intrusion monitoring and they are also the managed servic- es provider (MSP) for all the camer- as. “Across all locations, and in many different ways, we will lean heavily on our cameras to get smarter and provide excellent member service,” said Valentin.
Application/ case study OLS Installs Akuvox IP Door Entry Phone in Scunthorpe Office Rental Scunthorpe Office Rental is a fully serviced multi-occu- ●● We have had an Akuvox unit on demonstration and test- pancy business center providing modern office space, ing in our office for several weeks for this exact require- desk space, and meeting room hire for flexible short and ment and purpose. The easy to administer unit and cloud long-term working. portal works in sync with our business goals and ethos of transitioning customers to the cloud. The brief ●● This unit more than met the customer’s needs and expec- Being an established multi-use business center, Scunthor- tations and is easy to manage to add/remove tenants and pe Office Rental needed a system to replace the old visitors for both short term and long-term use via the audio-only Bewacom BM3, which managed tenants and cloud portal. visitors via the PABX and digital coded keypad entry. The system was several years old and antiquated using converters ●● With OLS adequately managing this service and future to the IP phone network. plans to upgrade other doors within the site to be ac- cess-controlled, this unit will easily be able to ingrate The scope was simple – upgrade the door entry system into the architecture of the system with ease. to a new, more robust, and technology-driven system. The new system had to have the ability to view visitors via an Installation details app and contain reporting tools. Crucially the new solution had to have video and audio functionality to verify visitors ●● This is the main entrance to the site, and aesthetics are and enhance the user and customer experience together with important for the customer experience, along with func- site security. tionality and security. The installer viewpoint ●● To start, the unit is very attractive, easy to use, easy to keep clean, and has an intuitive directory style menu for “As a Vanderbilt Gold Partner, we didn’t hesitate to explore visitors to use. the product range and new and innovative products that Vanderbilt is bringing to market through their supply chain,” ●● We also needed to keep in mind a multi-purpose access said Ollie Law, Managing Director at Oliver Law Security Ltd. control suite for entry was part of the specification – fa- cial recognition, proximity entry, and keypad entry due Solutions provided to the diversity of the site. ●● We chose the Akuvox R29S door entry phone, due to its ●● When called, each host (multiple per office) can answer enhanced features, facial recognition, and inbuilt Mifare via the app, whether in office or out of office. proximity reader. ●● With a very diverse customer base, the center needed a 46 SecurityLink India | August 2020 | www.securitylinkindia.com system that was reliable and also relied on existing infra- structure and no servers or onsite hosting. Key takeaway This unit has come into its own during the COVID19 out- break. It has allowed for facial recognition entry to be used for minimal touching of the units, enabled tenants to keep in contact with any visitors or deliveries they would have otherwise missed – easy to clean screen and IP rating. With more remote working and working from home, the smartphone app has become an even more valuable tool in a business owner’s toolbox.
application/ case study Sydney Trains to Adopt SafeZone to Enhance Staff Safety and Resilience Solution to be used by thousands of staff across the greater Sydney area Staff safety and customer service will network every weekday. makes possible a wide range of security be boosted across Sydney’s rail net- SafeZone enables staff management functions such as sending work with the deployment of SafeZone®, targeted alerts to specific individuals the industry-leading safety, security and to call for assistance and and groups. It enables control room op- emergency management solution from receive optimised response erators to pinpoint the location of indi- CriticalArc. at the touch of a button, via viduals needing help so they can initiate their assigned smartphone. the most efficient and rapid emergency The ground-breaking technology This capability is as valu- response. will enable Sydney Trains to manage a able on crowded city plat- wide range of situations, including mit- forms at rush-hour as it is “This visionary deployment by Syd- igating risks to staff and customers and on more remote suburban ney Trains will have a significant impact strengthening the capacity to respond stations where staff may be on the safety and well being of staff and to incidents and emergencies across the working alone late at night. thus will produce dividends with re- network. For example, SafeZone will gards to customer service and satisfac- put up to 2,500 of Sydney Trains’ front- “Sydney Trains is tion, and the potential for streamlined line staff directly in touch with security committed to fulfilling operations moving forward,” said Glenn control room teams, letting them sum- our duty of care to all of Farrant, CEO, CriticalArc, “With staff mon immediate assistance at the touch our staff and enhancing safety a primary concern for all rail op- of a button. our high safety standards in order to erators internationally, implementation maintain and enrich customer service of this technology by Sydney Trains The investment in SafeZone will levels on station platforms,” explained represents a significant step forward for cover over 175 stations across the great- Mark Edmonds, Manager of Security the sector and will be the blueprint for er Sydney area and is the latest step in Capability, Network Operations, “Em- many implementations to follow.” a modernisation drive to transform Syd- ploying proven technology such as ney Trains’ operations, with more than a SafeZone will help us solve day-to-day million customer journeys taken on the challenges, further improving the safe- ty of our staff and helping them work more effectively to continue to deliver world-class ser- vice.” Across its trans- portation network, Sydney Trains will now have real-time situational aware- ness, and a more complete picture of critical events. This SecurityLink India | August 2020 | www.securitylinkindia.com 47
Application/ case study New Honeywell Forge Features Help Protect Facilities from Cyber Threats Associated with Remote Operations Honeywell Forge Cybersecurity Suite serves industrial organizations that are increasingly embracing remote operations due to safety restrictions Honeywell’s offering features improved industrial-grade remote access and added protection and risk monitoring Honeywell recently released its to operational technology (OT) systems cybersecurity management inefficiencies. Forge Cybersecurity Suite that has risen by significant amounts in a Honeywell Forge Cybersecurity includes several enhancements to help 12-month period. ensure business continuity in the face of Suite addresses common pain points in mounting cyberthreats, uncertain global “As more operators of critical infra- OT domains, including: business conditions and continued sup- structure and facilities move to support ●● Safely moving and using operations ply chain disruption associated with re- remote work, they’re increasingly vul- mote operations. nerable to cybersecurity issues,” said data, Jeff Zindel, Vice President and General ●● Strengthening endpoint and network The new Honeywell Forge Manager, Honeywell Connected Enter- Cybersecurity Suite release (R200) prise Cybersecurity, “The Honeywell security, and incorporates new features such as en- Forge Cybersecurity Suite helps custom- ●● Improving cybersecurity compli- hanced industrial-grade remote access, ers increase productivity by providing increased asset discovery capabilities the next level of protection required for ance. with active and passive functionality and more secure remote operations and bet- Cybersecurity teams can provide improved cybersecurity risk monitoring. ter securing operational technology en- and manage remote access to vendors vironments with asset discovery, inven- with greater security and ease, allowing The enhancements come as more tory and continuous monitoring, as well these teams to better monitor cyber risks industrial organizations are embracing as risk and compliance management.” and operational health inside their envi- remote operations to effectively manage ronments. facilities with reduced numbers of onsite Honeywell Forge Cybersecurity The Honeywell Forge Cybersecurity personnel due to current safety restric- Suite provides users with a single dash- Suite is available in three versions – En- tions. A new Honeywell report indicates board to centralize security operations terprise Core, Enterprise Premium and that the severity of cyber threats detected and asset security management. It sim- Site offerings. Customers can scale as needed to match their security require- plifies, strengthens ments and budgets. It can be deployed and scales security either as a subscription or through operations for as- Honeywell Managed Security Services. set-intensive busi- Honeywell also provides Cybersecurity nesses facing evolv- Consulting Services to complement the ing cybersecurity Honeywell Forge Cybersecurity Suite to threats. It can im- help further strengthen cyber defenses. prove performance With more than 4,000 installa- at a single site or tions worldwide, Honeywell Forge across an enterprise Cybersecurity technology helps custom- by increasing cyber ers ensure business continuity in the face risk visibility while of mounting cyber threats, uncertain also decreasing global business conditions and contin- ued supply chain disruption. 48 SecurityLink India | August 2020 | www.securitylinkindia.com
application/ case study Major North American Bank Relies on PACOM for All Its Security Needs at Hundreds of Locations The subject bank is a subsidiary of a larger bank, and PACOM is really known for their extreme- together the two entities have over $20 billion in assets and thousands of employee associates. Primary banking of- ly high level of security, and they’ve really fices are located in seven Midwest and Southwest states. met our expectations. They’re always coming The challenge to the table offering new opportunities for Several years ago, members of the bank’s security team system integration witnessed PACOM’s GMS multi-site security manage- ment platform in action at another major bank. They liked Director of Corporate Security and Safety what they saw, but at the time, the GMS system was largely proprietary, and to truly work for the end-user, they wanted banking industry, plus the system can be remotely man- more of an open architecture. PACOM listened to that feed- aged over the bank’s private network, not in the cloud, back and moved toward a more open system architecture. not over the open Internet. ●● The GMS system offers integrated maps and alarm mon- The solution itoring, in addition to access control management, so end users have all the reporting needed to accomplish any The bank has installed over 300 controller panels through- type of investigation. out their branch network. Each panel has the capacity to handle 256 alarm inputs, 64 outputs, 64 card readers (doors) The products and a maximum of 256,000 cardholders. The only system limitation is the storage capacity of the OS/ hard drive, prov- GMS is the perfect multi-site security management plat- ing PACOM GMS is a true enterprise system. form, providing integration between access control, intrusion, video, intercom and virtually any building man- The benefits agement or security solution. Designed to manage thou- sands of locations simultaneously through a single interface, ●● The reliability and stability of the GMS platform have while providing industry-leading availability and redundan- allowed PACOM and the bank to develop a highly pro- cy. GMS meets end-user demands for a multi-site security ductive partnership. system with multiple integrations, which can be managed through a single interface simultaneously for an unlimited ●● PACOM’s open architecture simplifies the system, allow- number of locations. ing the bank’s network technical teams to better under- stand system operation – putting them in charge while SecurityLink India | August 2020 | www.securitylinkindia.com 49 offering superior system ease of use. ●● What sets PACOM apart is two-fold. The company de- signs all its own hardware and software and card access and alarms are managed on the same panel. ●● PACOM’s integrated access and alarms are unique in the
Application/ case study Providing Vehicle-Safety Inspections for Emergency Fleets UVeye, an Israeli company, has developed ●● Israeli company gives emergency-fleet contact-free, emergency-vehicle inspection operators the ability to perform drive- systems equipped with thermal sensors that not through, contact-free vehicle inspections. only can detect critical vehicle-safety problems, but also can identify drivers and passengers with ●● UVeye inspection systems equipped with fevers through vehicle windshields. thermal sensors can detect passengers and drivers with potential coronavirus fe- UVeye is offering to equip health-related fleet vers. operators with vehicle-inspection equipment on a not-for-profit basis during the current COV- ●● Company’s vehicle-inspection technolo- ID-19 crisis. Ambulance and police fleets, as well gy also could help hospitals speed test- as delivery services for food and medical equip- ing and care for COVID-19 victims. ment, all would be eligible for assistance. and vehicle rental agencies in setting up inspec- “Our technology can help fleet operators tion lanes that can ensure that their mechanics maintain their vehicles in safe operating condi- are not exposed to individuals that still might be tion without the need for ‘hands on’ testing or in- infected with the virus.” spection,” said Amir Hever, UVeye’s Founder and CEO, “As crisis conditions ease, we also will be Hever added that UVeye hoped its vehicle-in- able to assist car dealers, independent garages spection technology could assist federal, state and local government officials who are attempt- UVeye’s Helios underbody-inspection cameras can ing to speed up the process of identifying people identify a wide range of safety issues, including brake line infected by the COVID-19 virus. problems and potentially dangerous oil leaks Equipped with infrared thermal-imaging technology to detect body temperatures from a 50 SecurityLink India | August 2020 | www.securitylinkindia.com distance of several meters or more, a UVeye ve- hicle-inspection system could help health-care professionals rapidly identify individuals who might require additional COVID-19 testing or treatment. Vehicle-inspection systems equipped with thermal sensors, for example, could be installed at emergency drive-through lanes set up at hos-
Search