application/ case study pitals, health care facilities and other commu- Equipped with infrared thermal-imaging technology, nity locations to test for potential coronavirus UVeye contact-free vehicle-inspection systems can victims. detect the body temperatures of passengers and Hever said that his company is prepared to drivers through car windshields help equip drive-through check points in critical locations throughout the United States within UVeye’s technology initially was developed the next week, adding that UVeye already has or- for the security industry to detect weapons, ex- ders for the installation of contactless inspection plosives and other threats. The company later systems with thermal sensor technology at sev- saw an opportunity to use its expertise in ma- eral locations in both the UK and the U.S. chine-learning, artificial intelligence, algorithm development and camera technology to solve UVeye is known throughout the world for the safety and quality-related challenges within the development of artificial-intelligence systems to automotive industry. identify threats at security checkpoints and bor- der crossings, as well as detect vehicle quality The company’s Helios underbody scanning issues at dealerships and on new-car assembly systems when equipped with UV Inspect soft- lines. ware provides law enforcement agencies and se- curity professionals with the ability to automati- With headquarters in Stamford, Connecticut, cally pinpoint threats on vehicles that are not in and Tel Aviv, UVeye currently is working with six security databases. In addition to Helios, its other major car makers to install vehicle-inspection automotive products include Atlas, a 360-degree systems on assembly lines and at dealerships external-vehicle inspection system and Artemis, around the world. a system to check tire wear and quality. The UVeye executive noted that the company’s UVeye’s Helios underbody inspection cam- inspection equipment also can identify a wide eras can identify a wide range of safety issues, variety of ‘need to know’ mechanical problems including brake line problems and potentially and safety-related issues for vehicle owners. The dangerous oil leaks. company’s Artemis system, for example, auto- matically checks tire quality. And UVeye’s Heli- Equipped with infrared thermal-imaging os underbody inspection cameras can identify a technology, UVeye contact-free vehicle-inspec- wide range of safety issues, including brake line tion systems can detect the body temperatures problems and potentially dangerous oil leaks. of passengers and drivers through car wind- shields. The company’s Atlas and Helios vehicle-in- spection technology was shown for the first time SecurityLink India | August 2020 | www.securitylinkindia.com 51 in North America earlier this year at CES 2020 in Las Vegas. In addition to its own exhibit, UVeye’s technology also was featured in Honda’s CES display as part of the car company’s Xcelerator program designed to encourage new and trans- formative technology. Originally developed for the security industry to detect weapons, explosives, illegal drugs and other contraband, UVeye’s deep-learning tech- nology today is deployed globally at hundreds of high-security locations.
Application/ case study NEC-Led Team to Provide Hawaii’s Airports With Passenger Screening Technology NEC Corporation, NEC Corporation of America and isting processes and services rather than introducing a bot- their partner, Infrared Cameras Inc., were selected by tleneck or negative impact to processing speed,” said Raffie- the Hawaii Department of Transportation (HDoT) to provide Beroukhim, Chief Experience Officer for NEC Corporation thermal temperature screening and facial recognition tech- of America, “We look forward to working with the State of nology at Hawaii’s public airports to help protect the com- Hawaii to further automate and enhance the travelers’ ex- munity and identify passengers with a potentially elevated periences with our high throughput, multi-person thermal body temperature. The companies combined resources to screening solution.” submit a unified proposal for the project. NEC and Infrared Cameras were selected with a pro- “Taking these steps to implement the technology at our posal of $23.3 million for equipment and installation and airports shows our commitment to providing preventative a 10-year maintenance plan of $1.42 million annually for a measures against COVID-19 for the community,” said Ha- total contract amount of $37.5 million. The companies were waii’s Governor David Ige, “We recognize that temperature selected in part because of their innovative concept and func- screening won’t catch every infected passenger, but it is an tionality to deliver accurate and efficient thermal tempera- available tool that can be implemented and combined with ture screening for people traveling to Hawaii. The selection the additional measures the State is providing to help prevent committee evaluated various systems and technologies and the spread of this virus, while helping rebuild the economy.” NEC and Infrared Cameras were determined to be the best fit for Hawaii’s needs. “We are honored to become a part of this significant pro- ject for Hawaii towards the revival of tourism and business in The thermal temperature screening equipment will be the state,” said Toshifumi Yoshizaki, Senior Vice President, installed immediately at the Daniel K. Inouye Internation- NEC Corporation, “We believe NEC’s technology will help al Airport (HNL), Kahului Airport (OGG), Lihue Airport to ensure the safety and health of visitors and residents of (LIH), Ellison Onizuka Kona International Airport at Kea- Hawaii against COVID-19, and our team will make every hole (KOA) and Hilo International Airport (ITO). effort to ensure the success of this public and private joint project together with all of the partner companies.” Phase 1 will have the temperature scanners installed this month at the gates currently being used for arriving trans-Pa- “Team NEC’s approach is predicated on enhancing ex- cific flights. 52 SecurityLink India | August 2020 | www.securitylinkindia.com Phase 2 will have the temperature scanners installed at the remaining gates in the coming weeks. Phase 3 expects to have the facial recognition equipment installed by December 31, 2020. While the Hawaii airports system will leverage facial recognition technology, people should not think of the fea- tures they may have seen in a movie. The system incorpo- rates privacy protections from design to deployment and NEC will work with HDoT throughout this process to ensure the solution meets the requirements of the State of Hawaii. Furthermore, the system will only temporarily retain a picture of a person with an elevated temperature of 100.4 degrees and above to help airport representatives identify them and conduct an additional assessment to determine if
application/ case study health precautions are necessary. The picture will be erased ual temperature checks. Without the use of facial recog- within 30 minutes and will not be shared with any outside nition technology, an employee would need to be next to agencies. Anyone with a temperature below 100.4 degrees each camera at all times to pull a person aside as they will not have their image retained at all. walk by the camera, creating bottlenecks and further ex- posing employees to travellers, and thus, possible COV- The system will not automatically have a person’s per- ID-19 infection. sonal information such as their name, address or driver li- cense number. It will not contain information about criminal The given photograph in previous page illustrates an ex- history or outstanding warrants. ample of the technology to be used at Hawaii’s airports to help identify people with an elevated temperature of 100.4 The use of the thermal image capture technology is degrees or above. anticipated to be safer and more cost effective than man- OPTEX People Counting Technology at Heart of New Social Distancing Solutions An innovative and highly accurate people counting tech- Gateways including IAconnects’ MobiusFlow software, and nology from OPTEX, the leading global player in sens- display units mounted by the doors. The solution can com- ing and detection, is at the heart of a series of new solutions municate with any building management system (BMS) and to support social distancing in business and commercial en- capable of accurately monitoring occupancy levels during vironments as the COVID-19 enforced lockdown is being and after lockdown. gradually lifted throughout the Europe, Middle and Africa region. Thanks to embedding the latest message queuing telem- etry transport (MQTT) protocol into OPTEX’s proven Akri- bos VC-1020 people counting system, three new solutions from IAconnects, Vaelsys and Xenometric have now been developed. The protocol enables data to be communicated in real time and for the people count to be instantaneously up- dated – a crucial factor in the live monitoring of people flow. To help employers comply with the governmental rules and create a safe environment for employees to return to, IA- connects offers a social distancing room management tech- nology. It works by monitoring the number of people and occupancy level of common areas such as waiting rooms, meeting rooms, office lobbies, restrooms etc., and displaying the appropriate instruction. It might, for example, state ‘do not enter’, ‘cleaning required,’ or ‘free to go,’ or any other such status that the customer defines. The solution com- prises the OPTEX VC-1020 people counting sensor, WiFi SecurityLink India | August 2020 | www.securitylinkindia.com 53
Application/ case study To manage the flow of people inside retail outlets as tabase and full reporting functionalities. It can be hosted on they steadily re-open, Vaelsys has developed EasyCount and the customer’s server or on the Cloud. updated their existing Datacentre people counting solution to provide more functionalities regarding social distancing. Masaya Kida, Managing Director at OPTEX Europe EasyCount enables smaller retail outlets to display (with a (EMEA Headquarters) said the new solutions provide installers clear ‘go’/ ‘wait’ dashboard) the number of people allowed with an opportunity beyond security. “Many businesses and re- into their store at any one time and the average waiting time. tailers are using their security staff to manage access and control Datacentre is a scalable solution for larger and multi-site re- queue volumes and as such, installers have an opportunity to tailers that serves both as a people counter but also a more become the principal point of contact for bringing new solutions sophisticated analytics and performance tool. It has now in- regarding occupancy level and social distancing,” said Masaya tegrated the MQTT protocol of our Akribos to provide real Kida, “Most of the solutions presented are not only solving the time information and occupancy dashboards. issue created by the pandemic, but also solve the ongoing chal- lenge of efficiently and accurately monitoring occupancy levels The third of the new solutions comes from Xenometric within a busy working or retail environment.” which has further developed its range of people counting and occupancy-level software packages to integrate the MQTT The OPTEX Akribos VC-1020 is a real-time and mul- protocol and provide dashboards suited for enforcing social ti-directional indoor people counter that can provide more distancing. The entry-level solution, Xenoview, is suited to than 98% accuracy. It ignores trollies and baskets and man- independent retailers or smaller buildings. It collects the ages groups of individuals by tracking the direction or every real time count data from up to four Akribos, displays the individual, even if they are loitering. It now features MQTT, a occupancy levels on an integrated dashboard, and issue in- lightweight messaging open protocol, which manages teleme- structions to ‘go’ or ‘wait.’ The count data is stored locally try information, and is used in man-to-machine M2M and IoT and can also be used for retail analysis purposes. For larg- devices for real-time analytics, preventive maintenance moni- er or multisite applications, Xenometric has developed the toring etc. The MQTT protocol allows the people count to be X-server. Similar to Xenoview in terms of its functionality, immediately transmitted to the integrated occupancy software it differs in that it is fully scalable and includes an SQL da- platform and gives an exact picture on how many people are in the shop, room or a specific area. 54 SecurityLink India | August 2020 | www.securitylinkindia.com
application/ case study ACT365 Integration Helps Protect Marina Facilities in Danish City Vanderbilt’s ACT365 was recently added to the beautiful Danish city of Vejle The cloud-based access control and video man- For non-member boaters who are visiting the agement system was recently installed at the Vejle marina, a self-service terminal, the Harba city’s marina where it has integrated with their Kiosk, is also available to use. This self-service ter- booking system, Harba. minal allows non-members to use their credit card to pay for the use of the marina facilities. Similar There are 750 members with boats in the Vejle to the Harba app for members, non-members will marina, and through the Harba booking system, receive a PIN code from the Harba kiosk via email they are issued a 6-digit personal PIN code or a or SMS which they can then input into the ACT365 tag. With this PIN code, they can then access and readers. use the facilities of the marina such as the toilets, showers, laundry rooms and kitchen. The PIN is input into the ACT365 reader at each entry point of the marina facilities. All services are then automatically billed on a monthly base via the Harba booking system. This access control booking strategy ensures that the marina’s facilities are kept free for member use only. ACT365’s readers were well-suited to this in- stallation because they are made of robust poly- carbonate housing and are suitable for both in- door and outdoor mounting. The reader controls a single door and uses a voltage free relay contact. ACT365 has a modern and user-friendly design and a limitless number of users. Both RFID tags and smartphone access availability. SecurityLink India | August 2020 | www.securitylinkindia.com 55
white paper Five Reasons to Integrate Mobile Technology into your Security Solution By Steve Natton, Business Development Manager for Gallagher Mobile technology use in everyday life has increased barriers to adopting mobile technology, discuss the benefits massively in recent years. Most of us now have a mo- mobile technology can bring to an organisation, share the bile device that we use to manage different aspects of our views of industry leaders, and look to what the future holds lives – from banking, to accessing public transport, and even for mobile within the security industry. paying for a coffee. With approximately half of all web traffic around the globe coming from mobile device users, the move Barriers to mobile to mobile is having a major impact on industries worldwide. There are a number of reasons organisations may be hesi- So why then is mobile not utilised more within the security industry? tant to adopt mobile security solutions; whether it’s con- cerns over the safety of the technology, uncertainty of how In this white paper, we highlight five reasons to integrate the technology works, or hesitations from staff about using mobile technology into your security solution. Here, we personal devices for workplace access control. Here, we ad- take an in-depth look at some of the frequently referenced dress some of the most common concerns our customers raise with us in regard to mobile security technology. 56 SecurityLink India | August 2020 | www.securitylinkindia.com How secure is mobile? Just like a high security access card, mobile credentials are secure and safe. The nature of a mobile device automati- cally keeps the credential more secure than an access card, as people tend to care more about their phone than they do an access card, making them less inclined to lend their phone to others and are more likely to notice if their phone has been lost or stolen. If someone were to lose their access card on a Friday afternoon, for example, they may not notice it was missing until the following Monday, but a missing phone would be noticed much sooner. Mobile credentials are not susceptible to card cloning and some mobile solutions hold the option of adding two
White paper -factor authentication using the built-in device security such an app they’ve written on two wirelessly connected devices, as fingerprint, PIN, or facial ID on some phones. This is like mobile phones. One device will be held near the reader considered industry best practice and adds an extra layer of and the other near the phone that is being impersonated; the security, particularly if using biometrics, to ensure the cre- reader and phone will believe they are talking to each other dential cannot be used by anyone other than the authorised and perform the authentication. credential holder. Choosing an intelligent access control system that uses al- Reviewing the authentication method of a mobile cre- gorithms to detect this happening can mitigate the risk of these dential solution can provide some assurance as to the safe- attacks, as can requiring two-factor authentication at the reader. ty of the application. FIDO authentication, for example, is trusted by many leading technology organisations around the We use our access cards as staff ID. How world. It uses public key cryptography with the private key will we identify people on site? stored securely on the phone to create strong authentication that is resistant to phishing and other common attacks. Acombined staff ID and access card can present security risks. If someone were to misplace their card, it is easy With the current push to contactless methods for car- for the person who found it to identify which organisation it rying out day-to-day activities, mobile credentials can help belongs to and use it to gain unauthorised access to the build- protect people’s health and safety by reducing contact be- ing. Separate staff ID and access credentials can mitigate this tween people and surfaces. With a longer read range between risk, with mobile credentials negating the need for staff to the device and reader than an access card, people are unlikely carry two cards. to make direct contact with the reader, and, as mobile cre- dentials can be set up remotely, face-to-face interactions are Mobile reader technology can also be used to verify reduced, and there is no exchanging of access cards between whether someone is authorised to be in a particular area on people. This is especially beneficial for site visitors, where site. Using a mobile reader, a security operator can read an an access card may pass between many different people dur- individual’s credentials, verify their identity against the staff ing the course of a day. photo on file, and confirm if they have the authority to be in a certain area. Does Bluetooth technology leave you vulnerable? SecurityLink India | August 2020 | www.securitylinkindia.com 57 Mobile access control utilises Bluetooth Low Energy (BLE) for communication to access control card readers from mobile phones. A mobile access control system utilising a strong authentication method will ensure the communication is secure and cannot be used by anybody ‘sniffing’ the communi- cations to get access by replay attacks or other methods. Authentication methods like a public key-based creden- tial will keep communication secure between the reader and device. The reader will send a random string of data to the phone, and using a private key securely stored in the phone’s key store, the phone will sign the data and send it back to the reader. The reader will use the public key to validate that the digital signature is correct, and if so, will open the door. As a different random string of data is sent to the phone every time, there is no risk of unauthorised entry via replay attacks. The risk of a relay attack, or man in the middle attack, can also be mitigated. In a relay attack, an attacker will attempt to impersonate a person’s credentials using two devices to ‘re- lay’ the messages from the door and a person’s phone, using
white paper Not all of our staff have a suitable mobile In addition to time, mobile credentials can also save device. Does that mean they can’t get into organisations money. Mobile credentials are more af- the building? fordable than access cards, when compared to the costs of purchasing, printing, and distributing the cards and, by Moving to mobile credentials doesn’t have to be an all or utilising technology that is already in possession of the nothing solution. It’s not uncommon for sites operating users, organisations can reduce plastic waste and emis- mobile access technology to offer staff the choice between a sions associated with creating and shipping access cards mobile or card credential to ensure no one is excluded. throughout the organization. What are the benefits of mobile Other mobile security solutions allow security operators technology? to manage day-to-day security issues remotely. Tasks such as unlocking doors, managing alarms, and disabling cardhold- In addition to the security benefits listed in the previous ers in the event of a lost credential, can be easily managed on section, utilising mobile technology as part of a securi- the go via a secure mobile app that communicates directly ty solution offers many benefits to organisations. When im- with the security software. plemented as part of one integrated security system, mobile credentials are easy to deploy, simple to operate, and provide By freeing security operators from the control room, administration efficiencies and cost saving opportunities. they can easily respond to security events from anywhere on site, as and when they arise. This technology is critical in an Mobile technology removes the need for the operator emergency situation where operators need real-time security and card-holder to be present in the same place at the same information but may not have access to the control room. time to provision and receive credentials. This allows the operator to provision mobile credentials at a time that suits Mobile technology for efficient, fast them, and allows for instant access when the card-holder ar- emergency responses rives on site. At universities, in particular, this can save huge administrative efforts and time at the beginning of a semes- Security emergencies, whether they be evacuations or ter, when large numbers of students are arriving on campus lockdowns, require access to security information and at the same time and require access into lecture theatres and reliable communication with people on site. With the assis- halls of residence. tance of mobile technology, organisations can ensure com- pliance with health and safety requirements and create faster, 58 SecurityLink India | August 2020 | www.securitylinkindia.com more efficient evacuations and safer site lockdowns. In an evacuation, mobile technology can be used to ver- ify that cardholders are safe and reduce the time spent mus- tering. With wardens operating mobile technology linked directly to their security software, they have full visibility of movement on site, allowing them to move cardholders to safe zones and see which cardholders have not yet reported to the evacuation zone and may need to be followed up with. With no need to print physical evacuation lists, mobile technology avoids the manual and lengthy process of ac- counting for everyone’s safety, allowing people to safely re- turn to work sooner. Emergency lockdown processes can also be improved with mobile technology. Challenges in a lockdown situation include the length of time it can take to initiate the lockdown and providing effective communication to people on site. Mobile security solutions can ensure a secure, fast lockdown process while ensuring people have the information they need to keep themselves safe.
White paper Consider the following example of a lockdown situation Patrick Goudkuil from D J Goode & Associates be- at a high school. A teacher has identified a threat on campus. lieves mobile technology has a part to play in the future of Instantly, they can activate a campus-wide lockdown from access control across a large number of industries; however, their mobile device; no time is lost having to call the security he advises it should be viewed as a piece of the overall se- office or reception to initiate the lockdown. Within seconds, curity strategy, rather than the sole answer. Goudkuil recom- the school is locked down, all external doors are automatically mends choosing a recognised partner with a track record of locked, authorities are notified through an automated message, providing robust cyber security, and opting for technology and building access is limited to emergency responders only. that is secure and compatible with existing systems. Shortly after the lockdown is initiated, security officers What does the future hold? send a push notification to staff mobile devices informing them of the situation and advising them to ensure students As technology progresses and the world becomes more are safe. A separate notification is sent to students with di- mobile, it’s inevitable mobile technology will become rections to remain where they are and keep themselves safe. more prevalent in the security industry. While it is difficult A further notification is also sent to staff and students located to predict exactly what the next big development will be, we off site informing them to stay away until further notice. anticipate digital IDs will become a feature of mobile securi- ty in the near future. In utilising a secure digital ID that can This example demonstrates how mobile technology can be displayed on a mobile device, organisations can navigate enhance a lockdown response, ensuring fast responses and one of the barriers to mobile security – the need for staff to effective communication. Studies have found push notifica- carry a separate ID card in addition to their mobile access tions on a phone are considerably more likely to be read than credential. an email and receive higher engagement than a text/ SMS message. Push notifications are a more affordable option of The emergence of IoT and smart technology is accelerat- mass communication than text/ SMS messages and, as it’s ing our desire, as consumers, to integrate mobile technology clear where the communication is coming from, people are into our everyday lives. From million-dollar smart city pro- more likely to view them as a trusted source of information. jects, to the ability to switch on your washing machine from your mobile phone, we all want to be a part of the technology Industry views of mobile evolution. With the associated cost efficiencies and environ- technology use in security mental benefits, mobile has established an influential role in our future – not only for the security industry, but all aspects According to Steve Bell, Chief Technology Officer at of our lives. Gallagher, choosing a quality security system is vital in ensuring mobile security can provide secure, effective pro- SecurityLink India | August 2020 | www.securitylinkindia.com 59 tection that meets the needs of your site. He describes a secure mobile access solution as one which has algorithms in place to detect potential attacks, holds the option of adding additional authentication require- ments such as a fingerprint or PIN, and which utilises a se- cure authentication method such as public key credentials. Matt Brittle, Head of UK Security, Risk & Resilience at WSP, believes there are a few key things organisations need to understand as the security industry becomes more mobile, which includes seeking education on how to keep themselves protected against threats. With this knowledge, organisations can ensure they aren’t leaving themselves vulnerable to attacks. As Brittle describes it, we used to lock things away behind a physical door but with mobile, we need to understand what the new virtual door is. The more people understand about their mobile systems, the more secure and seamless the integrations can be.
feature Five Ways ‘Converged’ Security Benefits Business and Customers (Submitted by Prama Hikvision India) The majority of security systems has been stand-alone – one can eliminate the need for the customers to access and which means they were built to work in an independ- manage multiple devices using different logins or apps, sav- ent and self-contained way. This allowed them to perform ing them time, reducing complexity, and reducing risks asso- specific functions, like recording CCTV footage, or securing ciated with managing and using multiple passwords. a perimeter with intrusion alarms etc. Complex system in- tegrations have been the only way to bring these disparate Increase the installation efficiency for solutions together to increase security as a whole. major cost savings The answer to this challenge is technological ‘conver- With security systems that incorporate different systems gence,’ which essentially refers to the deliberate combination and platforms, installation complexity is often dra- of several disparate or complementary technologies into a matically increased, with multiple protocols to manage and single product or solution. For example, convergence allows even different cabling systems for different devices. Conver- previously siloed functions such as intercom and video sur- gence helps hugely by providing a single platform and uni- veillance systems, to create a unified view of an intrusion or fied interface, allowing one to add devices quickly and easily other security breach. The result is a solution that improves in batches, and quickly configure device parameters. situational awareness and, therefore, the safety of organiza- tions and their people and assets. All of this means that one can reduce the time and effort associated with project management and installation, and In this short blog, we overview 5 key ways that converged deliver even better customer experiences. One can also save security can benefit one’s business and customers: on technician’s hourly rates and installer rates, and he can also reduce the cost of deploying, maintaining, and rebuild- Enhance customers’ user experiences ing disparate systems for customers. Finally, he can reduce software licensing costs, helping them increase their margins The first major benefit of convergence is an improved and deliver the best value for customers. end-user experience, especially in terms of managing all the elements of the security solution more easily and ef- Boost customers’ security capabilities ficiently. In this context, convergence works by providing a single platform and interface for managing disparate security With security solutions made up of diverse devices and infrastructure and devices, including video cameras, access platforms, it can be more difficult to achieve an instant control systems, intercom, and alarm systems. In this way, view of a security breach and to respond quickly enough. An example would be an alarm sounding, but with no way to 60 SecurityLink India | August 2020 | www.securitylinkindia.com understand where the breach is taking place, and which cam- era it is being captured on. This challenge is addressed with converged systems, which can automatically link alerts and alarms to the output of a particular camera that is capturing the security breach. With converged systems, access control can be activated to close specified doors, and video clips streamed to customers via an integrated mobile app. In this way, a converged solution delivers greater per- formance and value for customers than traditional systems
feature made up of disparate elements. As an additional ben- Wi-Fi 6 efit, integration of devices allows each customer to set parameters for alarms such as the types of events A Much Needed Technology to that trigger them. Cater to Future Contingency Scale easily to meet customers’ growing By John Dong, Director, Tenda India needs As the world is grappling with Covid-19 crisis, people With converged security solutions, all security are forced to work from home due to social distanc- devices – from cameras to intercom – run ing norms to restrict the spread of the viral disease. But on a single underlying infrastructure and software certainly, it has also created a new problem, as a big pop- stack. With this common infrastructure in place, the ulation of our workplace is working from home and us- customers can expand the system with new devices ing Wi-Fi connectivity on a large scale creating internet quickly and easily, with no need for additional hard- problems. But evidently, technology is the solution to the ware or software anywhere in the environment, and persisting problem and this particular problem can be no need to re-invent the underlying infrastructure. decoded by using a new version of internet connectivity called ‘Wi-Fi 6.’ Generate new upsell revenues for the business What is Wi-Fi 6? Many small and medium businesses would Wi-Fi 6 is the newest version of Wi-Fi and is based benefit hugely by adding more sophisticated on the IEEE 802.11ax standard. It offers a number security capabilities – such as access control – to of advantages over older Wi-Fi technology. Wi-Fi 6 isn’t a their existing intrusion alarm and video solutions. new means of connecting to the internet like fiber – rath- However, many are deterred by the perceived com- er, it’s an upgraded standard that compatible devices, par- plexity and cost of rolling out and integrating new ticularly routers, can take advantage of to transmit Wi-Fi types of security devices into their environments. signals more efficiently. Basically, it is designed to enable users to more easily understand the type of devices they Convergence helps overcome this demand. One are using. can not only help his customers innovate to improve overall security and management efficiency, this is SecurityLink India | August 2020 | www.securitylinkindia.com 61 also an excellent opportunity for him to upsell new security solutions such as access control, intercoms, and smart doorbells to the customers. Find out more With convergent systems currently focusing on bringing different security capabilities together, integrating with Internet-of-Things (IoT) solutions is the next step. This will support alarms and alerts for all kinds of incidents, from intrusions and fire risks, right down to a light bulb or HVAC system failure. Prama Hikvision is pioneering this vision for con- verged security with our forthcoming convergent se- curity service solution. This brings together disparate security devices on the same, common, cost-effective, easy-to-manage platform and infrastructure.
feature Difference from other Wi-Fi accomplished is with a technology known as Orthogonal Frequency Division Multiple Access The latest Wi-Fi standard offers faster data (OFDMA). This allows a wireless channel to be transfer speeds. If you are using a Wi-Fi rout- divided into a number of sub-channels that can er with a single device, maximum potential speeds each be used to carry data for a different de- should be up to 40% higher with Wi-Fi 6 compared vice. This allows a single access point to com- to Wi-Fi 5. municate with more devices simultaneously. Wi-Fi 6 accomplishes greater speed and band- When we can use Wi-Fi 6? width by efficient data encoding, resulting in high- er throughput. Mainly, more data is packed into Officially, Wi-Fi 6 was introduced in the year the same radio waves. The chips that encode and 2019 but many major IT and networking com- decode these signals are more powerful and can panies are still to come on Wi-Fi by introducing handle the extra work. new devices that can work on the same platform i.e., Wi-Fi routers, smartphones, laptops etc. Cur- Advantages of Wi-Fi 6 rently, there are some Wi-Fi routers that work on Wi-Fi 6 but they are hugely expensive. However, in Wi-Fi 6 is more than just a new name. There the coming years more and more enterprises will are many significant improvements that are be shifting to the newer generation of Wi-Fi. incorporated into Wi-Fi 6 that will make it much more useful to wireless users around the world. Future scope of Wi-Fi 6 Here are some of these advantages: ●● Greater data transfer speed: Every Wi-Fi As we have witnessed connectivity problems due to the overloading of the internet grid generation has provided greater data transfer from multiple usages in the times of Covid-19, Wi- speed and Wi-Fi 6 is no exception. The theoret- Fi 6 is a blessing for future contingencies. It can ical speed of Wi-Fi 6 is 10Gbps. It achieves this provide faster internet speed by evenly distrib- increased speed by combining dual spectrum uting the spectrum to different products and can bands of 2.4GHx and 5GHz and also by employ- also help in sustaining IoT (Internet of Things) ing MU-MIMO technology for both uplink and applications that are going to come handy in fu- downlink data transfers. ture technology. All in all, Wi-Fi 6 is what 5G is to ●● Increased battery life: Another important telecommunication. benefit of Wi-Fi 6 is the increased battery life that devices accessing a Wi-Fi 6 network will Founded in 1999, Tenda technology is one enjoy. Battery life is extended through a fea- of the global leaders in networking devices and ture known as Target Wake Time (TWT). TWT equipment. Tenda has committed to delivering enables the Wi-Fi access point to communicate easy-to-install and affordable networking solu- with your device to tell it when exactly to turn tions, offering innovative, cutting-edge products its Wi-Fi radio to wake up and go to sleep. This to realize people’s intelligent life. The brand has helps conserve power as your device will spend been successfully providing cutting edge technol- more time in sleep mode than with previous ogy in home networking, business networking, Wi-Fi generations. switch, broadband CPE, gateway, power lines, ●● Better performance in congested and re- mobile broadband, and IP camera etc. As the first stricted areas: Wi-Fi tends to get bogged down home-grown router and wireless network device when you’re in a crowded place with a lot of manufacturer in China, Tenda has been a pioneer Wi-Fi enabled devices. The new Wi-Fi 6, also in adopting the latest technology and professional known as 802.11ax, incorporates many new service system to offer a reliable network. technologies to help with this. One way this is 62 SecurityLink India | August 2020 | www.securitylinkindia.com
White paper How Analytics Engines Mitigate Risk, Ensure Compliance and Reduce Costs By Kim Rahfaldt Director, Media Relations, AMAG Technology Organizations generate significant amounts of An analytics system evaluates data from an ac- data via their access control system. The data cess control system and applies a meaning to an is valuable, but how can the value be extracted? Or- individual’s behavior. Monitoring where an indi- ganizations need to maximize their data’s potential vidual presents their card (location of attempted value to identify possible threats. Using patterns, access), when they presented (time of day), and an analytics system detects anomalous behavior who attempted access (the person) provides a within access control data to highlight areas of con- deeper meaning around the data. It can detect sus- cern or suspicious behavior that may pose a threat picious activity and provide intelligence a security to an organization. team can use to monitor an individual or situation, or take immediate action. This white paper discusses why an organization needs an analytics engine, how it helps a business Organizations can filter data to see trends and improve its security program, and how it supports spikes in activity. Filter data by department, build- insider threat programs. Effective deployment of ing, region or by the hour of the day to learn exact- an analytics system helps organizations focus on ly when anomalies occurred. Compare one week how to mitigate risk, reduce costs and deliver com- to another week to monitor if and when behavior pliance. changed. View changes at certain times of the day to track patterns or filter to show only high-risk in- Apply Meaning to Existing Data formation. Access control systems track who presents a Monitor Behavior card, biometric or mobile credential at a par- ticular reader at a certain time of the day. That data An analytics system monitors employee, con- is collected within the access control system as a tractor and visitor behavior, and helps organ- list of events. The data captured is used by the sys- izations discover anomalous behaviors that could tem but is isolated from the events. potentially be harmful. SecurityLink India | August 2020 | www.securitylinkindia.com 63
white paper An analytics system determines a baseline of processes and technology systems that duplicate behavior and builds upon it. As it ingests data, it efforts. An analytics system integrates with HR, understands people’s patterns and routines. If an identity management and incident management individual changes his or her behavior, the system systems and helps remove silos by providing in- will notice the activity change and flag it. Risk scores sights into activity within those systems. are applied to the reader location, card-holder, and date and time of day. A reader at the entrance to The human resources department can set a a data center will have a higher risk score than a score within the system or designate someone as reader to enter a conference room. a risk without violating data privacy laws. A com- bined risk score is calculated, providing a compre- The system monitors individuals who hensive overview of risk extracted from multiple have: data sources. HR and Security work together to monitor flagged individuals and can communicate ●● Attempted to access areas they are not author- their actions based on the person’s risk score. ized to enter. For example if a person begins displaying ●● Accessed authorized areas, but at an unusual anomalous behaviors suddenly, and HR notifies time such as during off-hours or late at night. security that the person has put in their two-week notice. The security team can investigate the be- ●● Accessed areas more often than normal. haviors and take action, reducing risk of threats to ●● A high level of access because of their role at company personnel or property. the company. Improve Security Program Individuals with access to critical information or source code are considered a high risk to the Implementing an analytics program can re- company and are flagged accordingly within the veal weaknesses in security systems that have system. Closely monitoring employee, contractor gone undetected. The data, funneled through the or visitor behavior patterns reduces the risk of an analytics system, makes sense in a way that it nev- incident. If an employee is flagged, the company er has in the past, showing security gaps and where can take action based on its security policies. De- areas of improvement may be needed. tecting anomalous behavior early can potentially protect company resources and save money by Access Rights. The system will provide insight possibly preventing an incident. into employees who have excessive access. Em- ployees are often given access to more areas than Remove Silos are necessary to complete their job. Tightening access rights creates a more secure environment, Companies struggle with departmental silos and which reduces the risk of an incident occurring. need to improve how they work together and cross-functionally among departments. Compa- 24 Hour Access. Learn who has 24-hour access nies cannot afford to waste resources on people, to the building(s). If 24-hour access is not needed, access rights should be updated. 64 SecurityLink India | August 2020 | www.securitylinkindia.com Proactive. Review and update company roles and the access rights assigned to those roles. Iden- tify gaps in policies and close those gaps. Identify individuals with access rights outside of their as- signed role that conflict with current policies and restrict their access according to their assigned role. Compliance. Meet compliance requirements by ensuring all anomalous activity is investigated and immediate action is taken before an incident occurs.
White paper Integration. When a card-holder is flagged in An organization can gain a better understand- an access control system, the individual is auto- ing of what areas of a building or buildings are be- matically flagged in the analytics engine. ing used. If a building is underutilized, an organ- ization may close it. If a building is overflowing, Insider Threat. A comprehensive insider threat they can expand into another building. The data program consists of a combination of people, pro- helps an organization reduce overall costs and cess and technology. The security department, HR, drive efficiency. legal and compliance teams often work together and hire counter intelligence professionals and Meet Compliance investigators to establish their team. The inter-de- partmental team then focuses on what to protect Regulated industries that follow strict compli- inside the organization and establishes a frame- ance requirements will find an analytics sys- work to manage investigations. The team performs tem helpful in meeting regulatory requirements investigations, protects evidence and keeps data imposed by the government or other governing private. Implementing the right technology helps bodies. detect, record and track normal behaviors, provid- ing the data needed for investigations. Analytics Least Privileged Access. Least privileged systems play an important role in insider threat access assigns an employee the least amount of programs and offer many of the capabilities need- access needed to perform their job duties. LPA ed for a successful program. is a policy that only provides access according to job role. An analytics system helps ensure an in- An analytics system highlights anomalies in a dividual doesn’t have more access than needed person’s behavior that may indicate a bad actor. and will flag excessive access, ensuring compli- If a person is suspected of being an insider threat ance. and is flagged in the analytics system with a high risk score, investigators and the security team can Anti-passback violations. The analytics can filter the data to learn the person’s access attempts flag an individual whose first card read for the day and patterns. An investigation may be initiated if is at an interior door. If the individual bypassed the warranted. main entrance, they were allowed in by someone else, which is an anti-passback compliance viola- Geographical separation. The system can flag tion. The security team can investigate and take access control activity across geographically sepa- appropriate action to stop the violation. rated regions. If a card is used in New York and 10 minutes later used in London, the system will flag Conclusion the individual associated with that card. This indi- cates the card was most-likely cloned. The system An analytics engine brings value to the ex- learns how people move between readers and es- isting data within an access control system tablishes a baseline. through automated detection of anomalous ac- tivity, reducing the risk of an incident occurring. Enhance Understanding of It sifts through large amounts of physical secu- Facility Usage rity data, eliminating the need for costly custom solutions and ineffective manual processes. It An analytics system enables an organization operates in the background, reviewing and eval- to see daily trends such as what times of the uating each transaction across the whole security day certain areas have a high traffic flow and landscape, and determines within milliseconds if when people are leaving a building. Understand- there is a risk to the organization. Organizations ing the usage of a facility allows an organiza- can flag the riskiest identities before an incident tion to make better decisions regarding cleaning occurs, and maintain policy compliance by iden- schedules and building management functions tifying anomalous activity and taking immediate such as HVAC usage. corrective action. SecurityLink India | August 2020 | www.securitylinkindia.com 65
International Updates Food Fraud in Times of COVID-19 Thousands of tonnes of fake food and drink seized during Operation Opson IX More than USD 40 million worth of potentially “As countries around the world continue their efforts to con- dangerous fake food and drink was seized in tain COVID-19, the criminal networks distributing these poten- the latest Operation Opson, which also saw the dis- tially dangerous products show only their determination to make ruption of 19 organized crime groups and the arrest of a profit,” said INTERPOL Secretary General Jürgen Stock. 407 individuals worldwide. “The scale and variety of food and drink seized during Among the items discovered were dairy prod- this operation serves as a reminder for members of the public ucts contaminated with bacteria, meat from illegally to be vigilant about what they buy, and the need for con- slaughtered animals and food products falsely labelled tinued vigilance and action by law enforcement,” added the as medicinal cures. INTERPOL Chief. In Bulgaria, an investigation by the police and Other frauds connected to the pandemic were discovered, food safety agency into an unregistered warehouse including a shipment of seafood seized in South Africa and uncovered cheese which tested positive for E.coli bac- originating from Asia which was falsely declared as personal teria. Some 3.6 tonnes of unsafe dairy products set to protective equipment. be processed into cheese were seized and destroyed. Adulterated alcohol and illegal meat Operation Opson IX, coordinated by INTERPOL and Europol, saw more than 12,000 tonnes of illegal As in past operations, counterfeit and adulterated alcohol and potentially harmful items recovered from shops, continued to be a global concern. More than USD 20 markets and during transport checks. Police, customs, million worth of illicit alcoholic beverages were taken out national food regulatory authorities and private sec- of circulation, including 5,000 litres of vodka smuggled in a tor partners in 77 countries took part in the operation trailer in Norway. which ran from December 2019 through June 2020. Catherine De Bolle, Europol’s Executive Director, high- During checks conducted in Jordan, authorities lighted, “In times of crises, criminals always look for new seized some 2,000 litres of expired energy drinks and ways to abuse consumers and increase their illegal profit to 4,500 litres of expired soda. More than 7 tonnes of the harm of public safety. Counterfeit and substandard food rotten milk and cheese were also seized in the country. is not only deceitful to consumers but can also pose a sig- nificant threat to their health. Our annual Operation Opson COVID-19 pandemic links shows in its ninth year that cooperation between law enforce- ment, regulatory authorities and the private sector is crucial Highlighting the criminal links between different to protect both consumers and businesses from the harm types of counterfeit items, authorities also dis- criminals try to put on our plates.” covered thousands of fake medical products, including disinfectants and some 17,000 false COVID-19 test- At more than 5,000 tonnes, animal products were the top ing kits. seizures during this year’s Opson Operation. A new trend dis- covered in Europe was the falsification of horse ‘passports’ In fact, the operation demonstrated how global – in one case, horses transported into Italy using fake doc- distribution routes, both legal and illegal, have been uments claiming they were to take place in sports competi- affected by the COVID-19 pandemic. Seizures of ex- tions were in fact sent to a slaughterhouse. pired food items or where the expiry dates had been altered were significantly higher than during previous In addition to the fake food and drink, other illicit prod- Opson operations – possibly a sign of criminals capi- ucts recovered included cosmetics, footwear, clothing, hand- talizing on the disruption of food supply chains caused bags, car parts, electronics, tobacco and medicines, worth an by national lockdowns. estimated USD 3.1 million. 66 SecurityLink India | August 2020 | www.securitylinkindia.com
International Updates Advanced SURVEIL-X Conduct Risk Capabilities to Uncover Employee Misconduct and Market Abuse As FSOs continue to work in remote environments, the surveillance solution’s machine learning and specialized analytics target hidden behavioral anomalies With more employees working with third-party data and surveillance working, and where more resources from home or remote sites, fi- applications such as HR systems and need to be allocated. nancial services organizations (FSOs) physical access logs. ●● Auto certifications: SURVEIL-X are facing new compliance and regula- Conduct automates and tracks pro- tory challenges. To reduce the growing “With instances of misconduct ris- cesses around administering and risks associated with employee miscon- ing, and added concerns around em- tracking certifications, for example duct and market abuse in this current ployees working remotely, especially as required by SM&CR. Alerts are environment, NICE Actimize launched regulated employees, managing con- automatically generated when regu- SURVEIL-X Conduct, a package of duct risk has never been more chal- lated employees and business units advanced machine learning-based ap- lenging or critical,” said Chris Woot- fall out of compliance with certifi- plications to be offered through its en, Executive Vice President, NICE, cation requirements. SURVEIL-X Holistic Surveillance “Tied to this, senior executives at ●● Whistle-blower management: suite which combines both trade and some FSOs now have broad account- SURVEIL-X Conduct automates communications surveillance capabili- ability for their employees’ conduct, the collection and tracking of ties. SURVEIL-X Conduct helps FSOs due to regulations such as the UK’s whistle-blower complaints secure- assess, manage and mitigate a broad Senior Managers and Certification ly, using encryption to protect an- range of conduct risks across the enter- Regime (SM&CR). NICE Actimize’s onymity. prise, even when employees are work- SURVEIL-X Conduct solution offers ●● Risk mitigation actions: SUR- ing remotely. an unrivaled range of advanced capa- VEIL-X Conduct incorporates bilities to help firms manage conduct best-in-class case management and One common roadblock FSOs face risk and enforce cultures of account- workflow automation to streamline in detecting misconduct is the ina- ability.” investigations and ensure potential bility to analyze and link data across misconduct is consistently investi- surveillance and analytics silos. NICE NICE Actimize’s SURVEIL-X gated. Actimize’s SURVEIL-X Conduct solu- Conduct solution provides 360-degree NICE Actimize’s SURVEIL-X of- tion solves these problems through visibility into misconduct and where fers unparalleled risk coverage for buy- machine learning and behavioral it’s occurring – across teams, depart- side and sell-side firms, insurance com- analytics which analyze and link data ments, and/ or divisions within the panies, crypto exchanges, regulators across NICE Actimize’s best-of-breed financial services organization. Ad- and more by enabling accurate detec- solutions, including communication ditional capabilities of SURVEIL-X tion and rapid, thorough investigation recording and archiving, employ- Conduct include: of market abuse, inappropriate sales ee conflicts of interest (ECOI), deal ●● Risk dashboards: Using SUR- practices, conduct risk and otherwise management, trade surveillance, com- undetectable compliance risks to insu- munications surveillance, suitabili- VEIL-X Conduct’s enterprise-wide late firms from fines and reputational ty surveillance, and employee fraud. dashboards, senior level analysts damage. SURVEIL-X Conduct also interfaces and business executives instantly know where the greatest risks lie, whether or not current controls are SecurityLink India | August 2020 | www.securitylinkindia.com 67
International Updates NIST Launches Studies into Masks’ Effect on Face Recognition Software Algorithms created before the pandemic generally perform less accurately with digitally masked faces NIST digitally applied mask shapes to ing face masks. Later this summer, we “We can draw a few broad con- photos and tested the performance plan to test the accuracy of algorithms clusions from the results, but there are of face recognition algorithms developed that were intentionally developed with caveats,” Ngan said, “None of these al- before COVID appeared. Because re- masked faces in mind.” gorithms were designed to handle face al-world masks differ, the team came up masks, and the masks we used are digital with variants that included differences in The NIST team explored how well creations, not the real thing.” shape, color and nose coverage. each of the algorithms was able to per- form ‘one-to-one’ matching, where a If these limitations are kept firmly Now that so many of us are covering photo is compared with a different pho- in mind, Ngan said, the study provides our faces to help reduce the spread of to of the same person. The function is a few general lessons when comparing COVID-19, how well do face recogni- commonly used for verification such as the performance of the tested algorithms tion algorithms identify people wearing unlocking a smartphone or checking a on masked faces versus unmasked ones. masks? The answer, according to a pre- passport. The team tested the algorithms ●● Algorithm accuracy with masked liminary study by the National Institute on a set of about 6 million photos used of Standards and Technology (NIST), is in previous FRVT studies. (The team did faces declined substantially across with great difficulty. Even the best of the not test the algorithms’ ability to perform the board. Using unmasked images, 89 commercial facial recognition algo- ‘one-to-many’ matching, used to deter- the most accurate algorithms fail to rithms tested had error rates between 5% mine whether a person in a photo match- authenticate a person about 0.3% and 50% in matching digitally applied es any in a database of known images). of the time. Masked images raised face masks with photos of the same per- even these top algorithms’ failure son without a mask. The research team digitally applied rate to about 5%, while many oth- mask shapes to the original photos and erwise competent algorithms failed The results were recently published tested the algorithms’ performance. Be- between 20% to 50% of the time. as a NIST Interagency Report (NISTIR cause real-world masks differ, the team ●● Masked images more frequently 8311), the first in a planned series from came up with nine mask variants, which caused algorithms to be unable to NIST’s face recognition vendor test included differences in shape, color and process a face, technically termed (FRVT) program on the performance nose coverage. The digital masks were ‘failure to enroll or template’ of face recognition algorithms on faces black or a light blue that is approxi- (FTE). Face recognition algorithms partially covered by protective masks. mately the same color as a blue surgical typically work by measuring a face’s mask. The shapes included round masks features – their size and distance “With the arrival of the pandemic, that cover the nose and mouth and a from one another, for example – and we need to understand how face recog- larger type as wide as the wearer’s face. then comparing these measurements nition technology deals with masked These wider masks had high, medium to those from another photo. An faces,” said Mei Ngan, a NIST comput- and low variants that covered the nose FTE means the algorithm could not er scientist and an author of the report, to different degrees. The team then com- extract a face’s features well enough “We have begun by focusing on how an pared the results to the performance of to make an effective comparison in algorithm developed before the pandem- the algorithms on unmasked faces. the first place. ic might be affected by subjects wear- 68 SecurityLink India | August 2020 | www.securitylinkindia.com
International Updates ●● The more of the nose a mask covers, Stmicroelectronics and the lower the algorithm’s accuracy. The Fingerprint Cards Cooperate to study explored three levels of nose cover- Develop and Launch an Advanced age – low, medium and high – finding that Biometric Payment Card Solution accuracy degrades with greater nose cov- erage. World-leading biometric company Fingerprint Cards AB (Finger- prints) has teamed with STMicroelectronics a global semiconductor ●● While false negatives increased, false provider serving customers across the spectrum of electronics applications, positives remained stable or modestly to develop an advanced Biometric System-on-Card (BSoC) solution based declined. Errors in face recognition can on fingerprint recognition technology, addressing the market demand to take the form of either a ‘false negative,’ enhance contactless payment-card security and convenience. where the algorithm fails to match two photos of the same person, or a ‘false posi- The BSoC integration combines ST’s latest-generation secure-payment tive,’ where it incorrectly indicates a match technology based on the ST31/ STPay chipset and STM32 general purpose between photos of two different people. microcontrollers with Fingerprints’ next-generation T-shape sensor module The modest decline in false positive rates to provide a turnkey battery less secure solution for the banking market. show that occlusion with masks does not undermine this aspect of security. “Cost-effective and user-friendly biometric authentication will signif- icantly increase the security level and user convenience of banking trans- ●● The shape and color of a mask mat- actions. It may let banks raise or remove the maximum allowable transac- ters. Algorithm error rates were general- tion value for contactless payments,” said Laurent Degauque, Marketing ly lower with round masks. Black masks Director, Secure Microcontrollers, STMicroelectronics, “Fingerprint Cards also degraded algorithm performance in brings valuable and market proven expertise in solutions for battery less comparison to surgical blue ones, though and space-constrained devices. Their products combining powerful pro- because of time and resource constraints cessing and low energy consumption are ideal companions to our STPay the team was not able to test the effect of solutions for payment cards.” color completely. The report, Ongoing Face Recogni- The contactless payment card will be the first target under the agree- ment, with the intention to extend to other markets such as identification, tion Vendor Test (FRVT) Part 6A: Face rec- health, access, and transportation cards. ognition accuracy with face masks using pre-COVID-19 algorithms, offers details of Michel Roig, SVP for Payments and Access BL at Fingerprint Cards, each algorithm’s performance, and the team added, “This is a powerful collaboration to create innovative and opti- has posted additional information online. mized solutions that not only make it easier for card makers to integrate biometrics in their portfolio, but also bring the total cost down. In the end, Ngan said the next round, planned for lat- strengthening the security for contactless payments will offer consumers a er this summer, will test algorithms created worry-less payment experience.” with face masks in mind. Future study rounds will test one-to-many searches and add oth- Running on ST’s flexible Java Card™/ Global Platform® Operating er variations designed to broaden the results Systems (OS), ST’s STPay secure-payment products ensure support for further. multiple international and regional payment schemes, with proven security features built-in. STPay solutions benefit from EMVCo and CC EAL 6+ “With respect to accuracy with face hardware certifications, software certifications up to OS and application masks, we expect the technology to contin- level, and ST’s secure pre-personalization services that create an inherently ue to improve,” she said, “But the data we’ve trusted supply chain. taken so far underscores one of the ideas common to previous FRVT tests – individual SecurityLink India | August 2020 | www.securitylinkindia.com 69 algorithms perform differently. Users should get to know the algorithm they are using thor- oughly and test its performance in their own work environment.”
International Updates Delta Scientific Hits Job #10,000 Over 40,000 Vehicle Barrier Systems Manufactured Since 1974 Delta Scientific, the leading manufacturer of United States embassies around the world. In June counter-terrorist vehicle control systems of 2004, it received a $25 million order from the used in the United States and internationally, has U.S. Air Force and, in August of 2010, garnered a reached a milestone in achieving job number $19 million order to supply counter-terrorist vehi- 10,000. That translates to over 9,800 wedge barri- cle barricades for the forward operating bases in cades, 1,100 gates, 5,300 beam barriers, 23,000 bol- Afghanistan. lards and thousands of traffic spikes and gate arms. The first order was entered into the system in 1974 “From our first days, it has always been the goal for what is now the Sabre Tooth Traffic Control of Delta Scientific to help supply our clients with with tire spikes that enforces ‘one way’ traffic flow the best possible product solutions that meet their for parking facilities or other single direction vehi- vehicle access control application needs,” affirmed cle lanes. David Dickinson, President of Delta Scientific, “For instance, if one of our products doesn’t match the Delta has been fortunate to be on the receiving exacting security needs of the client, we will create end of several large contracts throughout their his- a new product that does and produce it on budget tory. In August of 1998, Delta Scientific announced and on time. We will then add it to our inventory of an $8 million order to produce barrier systems for available products for all.” 70 SecurityLink India | August 2020 | www.securitylinkindia.com As a result, Delta Scientific Corporation has be- come the world’s leading manufacturer of vehicle access control equipment with over 260,000 square feet of production facilities. Recognized as the in- dustry innovator, with a bounty of patents, more than 40,000 Delta systems protect people and prop- erty in over 130 countries around the globe. Delta Scientific has now proudly conducted 65 live full- scale crash tests. “Delta Scientific is the de-facto solution for pe- rimeter security applications. We are the trusted brand in the industry,” stated Greg Hamm, Vice President of Sales and Marketing, “With spare parts stocked and ready to ship daily, you can be assured that your Delta systems will always be operational. Delta’s technicians are available for installation and maintenance services as well as email and phone consultation. Product reliability, customer service and innovation are the standards that set Delta apart from the competition.”
International Updates COVID-19 Pandemic Sparks 72% Ransomware Growth, Mobile Vulnerabilities Grow 50% Skybox Security’s publishes mid-year update to its 2020 Vulnerability and Threat Trends Report predicting 2020 will break a new vulnerability record Skybox® Security recently published remotely, the network perimeter has sig- al, data-rich intelligence has never been the mid-year update to its 2020 nificantly widened – securing this pe- more pressing.” Vulnerability and Threat Trends Report. rimeter now needs to be a top strategic The report analyzes the vulnerabilities, priority. Organizations need to be able The report further reveals that the exploits and threats in play over the first to identify the flaws that sit within both volume of mobile vulnerabilities has half of a year dominated by the chaos personal and professional devices. They increased by 50 percent. This increase surrounding the COVID-19 pandemic. also need to be able to model their ex- is wholly driven by new Android de- The report, compiled by Skybox® Re- panded network so that they can under- ficiencies (which increased by 110 search Lab, aims to help organizations stand all potential attack vectors. If they percent from 230 last year to 484 this align their security strategy with the re- do not have these capabilities, then they year), after the number of new iOS vul- ality of the current threat landscape. will not be able to manage the mass of nerabilities dropped by 23 percent from 20,000 new vulnerabilities, leaving them 152 to 117. In previous years such an Key findings from the report include: vulnerable to attack; something that they increase may not have concerned secu- cannot afford at a time of global finan- rity leaders, but after COVID-19 pan- ●● 20,000+ new vulnerability reports cial uncertainty.” demic blurred the line between corpo- predicted for 2020, shattering previ- rate and domestic spaces it underlines ous records. Also notable in the report is the in- the importance of securing all possible crease of ransomware’s popularity, with access points. ●● 50% increase in mobile vulnerabil- the number of new samples rising by ities highlights dangers of blurring 72% over the first half of the year. In order to weather the COVID-19 line between corporate and personal pandemic and the resulting new threat networks. Sivan Nir, Threat Intelligence Team landscape, organizations need to incor- Leader for Skybox Security, com- porate accurate, up-to-date threat intel- ●● Ransomware thrives during COV- mented on this rise, “We observed 77 ligence into their vulnerability manage- ID-19 pandemic, with new samples ransomware campaigns during the first ment strategy. Skybox’s approach offers increasing by 72%. few months of the pandemic – includ- a systematic process where vulnerabili- ing several on mission-critical research ties are discovered on a continual basis; ●● Attacks on critical infrastructure, labs and healthcare companies. The prioritized in the context of the network, including healthcare companies and focus and the capability of attackers is assets and threats; and remediated or research labs, have added to chaos. clear – they have the means to impart mitigated in accordance with the risk “The global COVID-19 pandemic serious financial and reputational harm they pose. Such an approach is vital to on organizations. The need for focused being proactive against today’s threats has completely reshaped the way that or- remediation strategies that are informed and adaptive to the volume of new ganizations and their employees work,” by full network visibility and contextu- threats yet to come. said Ron Davidson, VP of R&D and CTO for Skybox Security, “With the majority of the workforce now working SecurityLink India | August 2020 | www.securitylinkindia.com 71
International Updates Forcepoint Dynamic Edge Protection Delivers Industry’s First True Data-Centric Sase Solutions Forcepoint, the leading global ●● Forcepoint Dynamic Edge Protection’s new suite of SASE solu- cybersecurity player recently intro- tions, including Cloud Security Gateway and Private Access, ad- duced its dynamic edge protection suite dresses enterprises’ mass telework security needs while reducing of cloud-native SASE solutions featur- security complexity and point product interoperability challenges. ing new Cloud security gateway and private access offerings. With today’s ●● New Forcepoint Cloud Security Gateway delivers 30% reduction in introduction, Forcepoint is delivering software cost of ownership with all-in-one converged security of- the industry’s most comprehensive suite fering featuring Secure Web Gateway, CASB and DLP capabilities of converged capabilities to address en- as a single service. terprises’ most critical work-from-home security challenges across network secu- ●● New Forcepoint Private Access cloud service provides true ze- rity, threat protection, secure access and ro-trust remote access to internal applications without the com- data protection. plexity, bottlenecks and risks of VPNs. Forcepoint recognizes that solving with increased ease of use, while at the cloud service. It provides full visibility today’s most pressing security problems same time reducing costs and complex- and control for remote workers, sites and requires tight integration of capabilities ity via vendor consolidation and dedi- on-premises facilities. With Cloud secu- that cross traditional product bounda- cated circuit offload.” rity gateway, Forcepoint is taking the ries, such as delivered through a SASE guesswork out of securing highly dis- architecture approach. Industry’s first true data- tributed enterprises as they transform to centric SASE solutions the cloud. This 100% cloud-native ser- According to Gartner’s June 30, vice is available as a single SKU, elim- 2020 report ‘Hype Cycle for Network The Forcepoint dynamic edge protec- inating the complexity of purchasing, Security, 2020’, Co-authors Neil Mac- tion suite of SASE solutions enables administering and supporting multiple Donald and Joe Skorupa wrote, “True enterprises to use the cloud to transform products or solution bundles. SASE services are cloud-native – dy- their network and security architectures, namically scalable, globally accessible, simplify connectivity and unify security Forcepoint private access is a new typically micro-services based and mul- policy enforcement throughout their dis- cloud service that provides true ze- titenant. The breadth of services required tributed application and network envi- ro-trust remote access and a built-in Fire- to fulfill the broad use cases means very ronments. The company’s new converged wall-as-a-Service (FWaaS) to protect few vendors will offer a complete solu- cloud services, Cloud security gateway internal applications without the com- tion in 2020.” and private access, give global enterpris- plexity, bottlenecks and risks of VPNs. es better visibility, control and protection It gives organizations fine-grained con- They continued, “SASE will ena- for users and data against threats and loss, trol without exposing internal networks, ble I&O and security teams to deliver wherever people are working. and it frees remote users from having to the rich set of secure networking and work differently or suffer slower cloud security services in a consistent and Forcepoint Cloud security gateway performance. Unlike other vendors who integrated manner to support the needs brings together the company’s mar- offer private access products, Forcepoint of digital business transformation, edge ket-leading secure web gateway (SWG), private access protects internal applica- computing and workforce mobility. Cloud access security broker (CASB) tions and networks against potentially This will enable new digital business and data loss prevention (DLP) technol- compromised remote devices and net- use cases (such as digital ecosystem ogies into a single centrally-managed and mobile workforce enablement) 72 SecurityLink India | August 2020 | www.securitylinkindia.com
International Updates works while also preventing the loss of sensitive information Remote Proctoring for or intellectual property. Certification Exams Together, Cloud security gateway and private access de- ANSI-approved remote proctoring liver global enterprises a modern cybersecurity path forward allows security professionals to sit for harnessing the power of the industry’s most comprehensive ASIS board certification exams from cloud-native suite of converged capabilities, including; ●● Network security: Secure web gateway and next-genera- the comfort of their own home tion firewall as-a-service. ASIS International, the world’s largest association of se- ●● Threat protection: Intrusion detection and prevention curity management professionals, has offered the ability for security professionals to participate in remotely proctored systems (IDPS), intrusion prevention systems (IPS), An- exams for its board certifications. Following the COVID-19 tiVirus (AV), advanced malware detection (AMD) all de- pandemic outbreak, this new option allows professionals who livered as-a-service. cannot – or would rather not – travel to their nearest Promet- ●● Remote browser isolation (RBI) powered by Ericom. ric test center to sit for their exams in their own home or of- ●● Secure access: Cloud access security broker (CASB) and fice – anytime, anywhere, at no increased cost. zero trust network access (ZTNA). ●● Data protection: Industry-leading cloud and endpoint Using Prometric’s ProProctor remote proctoring soft- data loss prevention (DLP). ware, those who are pursuing the Certified Protection Pro- “Today’s business environment is irrevocably changed fessional (CPP), Professional Certified Investigator (PCI), as COVID-19 has introduced the security risks of the diffi- Physical Security Professional (PSP), or Associate Protec- cult-to-manage work-at-home environment. A SASE architec- tion Professional (APP) exams can do so anywhere there is ture approach that is cloud-first, end-user aware and powered a solid internet connection. While taking the exams remote- by a converged security platform with unified user policy de- ly has different check-in procedures, the exams themselves livers a compelling path forward. With cloud security gateway will not change no matter where an individual chooses to and private access, Forcepoint is today introducing the indus- take the exam. try’s first true cloud-native SASE solutions, that make it easy for enterprises to adopt by simply extending their existing “The ASIS certification programs continue to be the on-premises policy to the cloud to protect work-from-home gold standard for anyone working in security management,” users,” said Nico Popp, Chief Product Officer at Forcepoint, stated Joseph L. Rector, CPP, PCI, PSP, 2020 Professional “Forcepoint’s data-centric SASE is the answer to securing the Certification Board Vice Chair, “Earning an ASIS certifi- new mass telework workforce. For security teams today, it is cation shows your peers, colleagues, and supervisors that as much about protecting the user against threats as it is about you have mastered the knowledge and skills to be a success- enabling home users to securely connect to corporate appli- ful security manager. And now we offer the convenience of cations in the cloud and on-premises, while controlling and taking the exam in your own home. This is a major devel- protecting the data that home users are accessing and moving opment in certification, and we believe our members will to their insecure home.” appreciate having this option available to them.” Simplified per-user pricing to scale and ASIS began investigating remote proctoring when test support secure remote working center availability was impacted at the start of the world- wide COVID-19 pandemic. Based on its accreditation un- Customers can purchase an annual subscription to Cloud der the ANSI/ ISO 17024 Standard, the American National security gateway for $99 per user per year or private ac- Standards Institute (ANSI) awarded ASIS permission to cess for $79 per user per year. With Cloud security gateway, move forward with the ProProctor option in July 2020. enterprises garner a 30% reduction in software cost of own- ership versus bundled solutions available in the market today. SecurityLink India | August 2020 | www.securitylinkindia.com 73 Organizations can eliminate the need for multiple point prod- ucts from different vendors and consolidate the adoption of required security capabilities as a service to secure the new ways of users working from anywhere.
International Updates Nec and Sita Announce Global Aviation Partnership Agreement to Deliver the Future of Digital Identity at Airports Companies to unlock the potential of a truly walk-through airport experience NEC Corporation and SITA recent- biometric identity to check-in, make and airline applications while delivering a ly announced a global partnership payments, drop their bag, as well as smoother airport journey. to develop market-leading solutions that pass through security, immigration and enable a secure walk-through travel ex- boarding by simply scanning their face MasakazuYamashina, Executive Vice perience at airports, leveraging NEC’s at each step. Key touch-points will au- President, NEC, said, “NEC is pleased to I:Delight identity management plat- tomatically recognize one as a passen- collaborate with SITA to provide ‘NEC form together with SITA Smart Path and ger, making steps such as bag drop and I:Delight,’ which utilizes NEC’s cut- SITA Flex. boarding effortless. ting-edge digital identity solutions that capitalize on biometrics technologies to The partnership comes as airports The two companies will collaborate deliver a unified customer experience and airlines increasingly look to low- to develop this ground-breaking solution across a wide range of services.” touch and automated passenger pro- by utilizing both companies’ global pres- cessing in order to comply with new hy- ence in the market and the combination Raffie Beroukhim, Chief Experience giene requirements following the global of technology for common use platforms Officer, NEC Corporation of America, COVID-19 pandemic, in line with rec- and artificial intelligence (AI) solutions. and head of NEC Global Aviation Center ommendations from Airports Council of Excellence said, “We look forward to International and IATA. With cutting-edge identification tech- this partnership with SITA and the oppor- nologies and AI solutions including the tunity to develop and implement the most Through the partnership SITA and most accurate face recognition algorithm, advanced platforms at airports through- NEC will further unlock the potential NEC’s I:Delight platform allows passen- out the world, thereby contributing to the of seamless next-generation passenger gers who have opted to use the service to digitization of the airline industry and processing solutions, making mobile be identified quickly and with a high-de- making travel safer and more enjoyable.” enabled and touchless airport processes gree of accuracy, even when passengers a reality. This will allow passengers to are on the move. SITA Smart Path and Barbara Dalibard, CEO of SITA, use their digital identity on their mobile SITA Flex solutions are able to integrate said, “In NEC we have another strong phone whenever they travel at each step mobile and NEC’s biometric technologies partner where together we are able to in the journey. Passengers will use their with existing common-use infrastructure deliver to our airline and airport custom- ers a more seamless, automated jour- ney through the airport. We know that passengers value the benefit of a truly self-service experience. Leveraging SITA’s common-use footprint in more than 460 airports globally and NEC’s award-winning identity management technology, we are well placed to help our customers deliver a truly unique and efficient experience in the airport, par- ticularly during these challenging times where there is increased focus on the health and safety of passengers. NEC and SITA unlock the potential of a truly walk-through airport experience.” 74 SecurityLink India | August 2020 | www.securitylinkindia.com
International Updates Motorola Solutions Acquires Global Video Security Solutions Provider Pelco for $110M in Cash, Continuing Investment in Video Security & Analytics Motorola Solutions, Inc. has completed the acquisition of Pelco, Inc., a global provider of video security solutions based in Fresno, California. Pelco designs, develops and distributes end-to-end video technology, including video security cameras and video manage- ment system software. The company’s scalable solutions and commitment to service delivery enables customers of all sizes to mitigate risk, increase operational efficiencies and enhance safety. “Video continues to play a more powerful role in enabling safer cities and securing businesses around the world,” said Greg Brown, Chairman and CEO, Motorola Solutions, “Pelco’s track record of innovation, internationally recognized brand, global channel and customer installed base enable us to further expand our global footprint with enterprise and public safety customers.” Motorola Solutions is a global leader in mission-critical communications and analytics. Our technology platforms in mis- sion-critical communications, command center software, video security & analytics, bolstered by managed & support services, make communities safer and help businesses stay productive and secure. At Motorola Solutions, we are ushering in a new era in public safety and security. AMAG Technology Rebrands RISK360 to Symmetry™ Incident Management AMAG Technology, a G4S company and one of the world’s leading unified security solutions providers that help organizations mitigate risk, re-branded its RISK360 Incident and Case Management software to Symmetry Incident Management. The new name aligns with AMAG Technology’s current Symmetry naming structure. “With our latest technology upgrade, the timing was right to update the name to Symmetry Incident Management,” said AMAG Technology President, Howard Johnson, “The new name more accurately represents what solution the product solves within AMAG’s Symmetry naming structure, and customers will be able to more easily identify it within our solution set.” Symmetry Incident Management automates, investigates, analyzes and documents incidents to help organizations make informed decisions to operate efficiently, and save money, mitigate risk and enforce compliance. The mobile application combines data from differ- ent security platforms, and outlines a workflow from start to finish that aligns with an organization’s corporate policies, eliminat- ing costly inconsistencies, inefficient communications and improving the bottom line. It also integrates with Symmetry Access Control, allowing alarm events in Symmetry Access Control to be automatically added as events in the Incident Management System. SecurityLink India | August 2020 | www.securitylinkindia.com 75
International Updates Cellebrite Adds Cryptocurrency & Blockchain Investigations Solution to Industry Leading Digital Intelligence Platform Cellebrite’s Crypto Tracer solution gives investigators unparalleled visibility into Cryptocurrency movement Cellebrite, one of the global leaders in digital intelli- tigators full visibility into the lifespan of cryptocurrency gence (DI) solutions for public and private sectors transactions, including where the money originated and has recently launched Cellebrite Crypto Tracer, a new where it went, in both wallets and exchanges. Graphic comprehensive cryptocurrency investigation solution de- mapping and color-coded threat level transactions en- signed to accelerate investigations involving blockchain hance the visualization and understanding of the activities technology and cryptocurrency. The solution, powered and accelerate investigators’ abilities to pinpoint primary by CipherTrace, features powerful and easy-to-use tools, and associated criminal activity and its perpetrators. investigation services, and training programs designed for investigators, analysts and non-technical agents. The Powered by CipherTrace Inspector, the world’s most solution empowers teams to lawfully obtain evidence and comprehensive cryptocurrency intelligence tool, the Cel- trace criminals who use bitcoin and other cryptocurren- lebrite Crypto Tracer Solution gives investigators the cies for illicit activities, including money laundering, ability to: terrorism, drug and human trafficking, weapon sales, and ●● Utilize a blockchain search engine: Simply enter a ransomware schemes. cryptocurrency address or transaction ID into an intui- Every year, an estimated $76 billion of illegal activi- tive search bar that will auto-complete long addresses. ties involve Bitcoin. Nearly one hundred percent of dark- ●● Conduct risk scoring: Profile hundreds of global ex- net market transactions, including the sale of ransomware, changes, ATMs, mixers, money laundering systems, illegal drugs and phishing kits, involve cryptocurrencies, gambling services, and known criminal addresses and in large part due to their ease of transacting online and assign risk levels to transactions. across borders. The use of cryptocurrencies among crimi- ●● Show a deep analysis of potential risks: Non-techni- nals may have been furthered by their perceived anonym- cal users can visualize transaction flows to follow vir- ity. Transactions are recorded on the blockchain, which is tual money trails without becoming a cryptocurrency a public ledger, enabling anyone to see the transactions or blockchain expert. though not the identities of those executing said transac- ●● Demonstrate high-quality advanced attribution: tions. Top entity typologies and attribution collection meth- ods are easily identifiable within Inspector. Cellebrite Crypto Tracer Solution ●● Leverage a massive transaction database: Allows users to understand interactions with a powerful graph The Cellebrite Crypto Tracer solution is designed to that traces the flow of funds over time and through the reveal illicit transactions using cryptocurrencies and blockchain ecosystem. enables investigators to aggregate and curate millions of ●● Operate with integrated case management: Gives open source and private references, deception data and investigators a convenient way to save research, replay human intelligence, resulting in a dataset of over 522 searches, export investigation reports and collaborate million attributable points. These data points give inves- with others involved in the investigation. 76 SecurityLink India | August 2020 | www.securitylinkindia.com
International Updates Also included in Cellebrite Crypto Tracer: tocurrency transactions remain untraceable and un- ●● Cryptocurrency investigation services: The Celleb- known,” said Leeor Ben-Peretz, Chief Strategy Officer, Cellebrite, “This is a misconception. As a matter of fact, rite advanced services (CAS) team conducts criminal the essence of blockchain is to indelibly keep a record of and civil cryptocurrency fraud investigations for law each step of every transaction. We’re enabling investiga- enforcement and corporations. Cellebrite certified fo- tive teams to extract this information and use the power rensics experts employ advanced techniques to expose of digital intelligence to aid them in interpreting the data financial cybercrime and fraud schemes by analyz- needed to identify illicit blockchain activity and keep ing cryptocurrency artifacts and providing investiga- communities safe.” tive teams with detailed documentation and insights through analyst level reports. “We’re very excited to offer our best-in-class crypto- ●● Cryptocurrencies investigation training: A 3-day currency tracing and blockchain analytic capabilities to course in best-practices for cryptocurrency investiga- enhance Cellebrite’s digital intelligence, training and in- tion techniques. The class teaches investigators how vestigative services,” said Stephen Ryan, COO of Cipher- to use CipherTrace Inspector to obtain and analyze Trace, “As criminals increasingly utilize cryptocurrencies evidence about individuals committing crimes using in their illicit activity, our partnership with Cellebrite will cryptocurrencies. be that much more important to making the digital world “It has long been assumed that blockchain and cryp- a safer place.” ASSA ABLOY acquires FocusCura in The Netherlands ASSA ABLOY has signed an agreement to acquire FocusCura, a leading provider of technology solutions for senior care in the Dutch market. FocusCura has developed a software platform, which in combina- tion with other products and technology services, enables elderly care organizations to focus on care. “I am very pleased to welcome FocusCura and their employees into the ASSA ABLOY Group. FocusCura is a strategic technological addition to the ASSA ABLOY Group. The company will reinforce our current offer- ing within Senior Care and will provide complementary growth opportunities,” says Nico Delvaux, President and CEO of ASSA ABLOY. “FocusCura is a true innovator in digital solutions for care providers and senior people. The FocusCura offering is a good fit with our solutions in Phoniro and together we will continue to support people to stay independent for longer and live enriched lives,” says Christophe Sut, Executive Vice President and Head of Global Technologies business unit Global Solutions. FocusCura was founded in 2003 and the main office is located in Driebergen-Rijsenburg, Netherlands. Sales in 2019 amounted to about EUR 13 million (approx. SEK 130 million) and the acquisition will be dilutive to EPS from start. The acquisition is expected to close during the third quarter of 2020. SecurityLink India | August 2020 | www.securitylinkindia.com 77
Product showcase Prama Hikvision Introduces “We at Prama Hikvision are happy to introduce this lat- est product DeepinView camera line in India. Embedding Dedicated Series in its switchable algorithms is a significant step in AI enabled DeepinView Camera Line product development. In a world of ever-changing technol- ogies and functionalities, this approach creates great value Cameras in this dedicated subseries come equipped with for end users to try new technologies to ensure security, as multiple dedicated algorithms that can be selected and well as to implement business intelligence and other applica- engaged discretely based on the needs of the installation, tions,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision then switched as the security needs change. India Pvt. Ltd., “The benefits of our new offerings are nu- merous including reduced costs, improved efficiency, and Prama Hikvision, India’s leading video security solution speedy and effective incident response.” provider, has announced a brand-new addition to its Deepin- View camera line – the Dedicated Subseries. This unprece- Switchable algorithms dented new addition loads a batch of AI-powered deep learn- ing algorithms into each unit, boasting stunning performance The Dedicated DeepinView cameras combine two prod- and cost-effective pricing. uct categories – the first is vehicle analysis where cam- eras combine automatic number plate recognition (ANPR) Enhanced AI capabilities with vehicle attribute recognition. Attributes include the ve- hicle’s make, color, and direction of movement. Typical uses Over the last few years, artificial intelligence (AI) has include installation at checkpoints of city streets and at en- been applied in many ways in security markets. As trances & exits of buildings or industrial parks. technology advances, AI chipset performance has improved to enable massive computing power using various algorithms Models in the second category boast six switchable deep and contributing to multi-intelligence functionality and high- learning algorithms in one camera housing, including facial er accuracy. The new Dedicated DeepinView cameras are an recognition, face counting, hard hat detection, perimeter pro- example of these advances, incorporating several AI-pow- tection, queue management, and multiple-target-type detection ered deep learning algorithms in one unit. What’s more, (detecting multiple targets and multiple types of targets at once). these algorithms can be switched essentially putting 5 or 6 Accordingly, users can simply enable an algorithm manually for unique cameras in one housing. dedicated use, then later switch the algorithm as needed. 78 SecurityLink India | August 2020 | www.securitylinkindia.com Here is one example – hard hat detection. This algorithm can be used on construction sites to ensure safety and com- pliance. Specially-equipped DeepinView cameras can pre- cisely distinguish a worker on the site wearing a hard hat from those without, and automatically deliver alerts when the hard hat violation is detected. Another example – in a retail setting, a face-counting function can be enabled to precisely count customers enter- ing and leaving the store. Repeat customers and store staff can be automatically excluded in the process, helping store managers count new customers with precision. Flexibility among algorithms enables users to also switch among: Perimeter protection: to monitor outdoor areas needing security and deliver accurate alarms upon intrusions. Facial recognition: to grant authorized access to restrict- ed areas in various organizations such as school laboratories, archive rooms, and hospital pharmacies.
product showcase Queue management: to better understand customer The interactive simulator illustrates the differences between various wait times, optimize staff levels, and enhance customer ex- camera technologies in precise detail perience. megapixel, PTZ or multi-sensor cameras. Particularly dur- HD clarity, day and night ing zoom operations, something must be sacrificed – either the essential detail resolution (megapixel and multi-sensor Equipped with Prama Hikvision’s DarkFighter and Light- cameras) or the overview (PTZ). Accordingly, the camera Fighter technologies, these cameras capture vivid and images are often not usable or pertinent scenes are simply color images in extremely low-light environments or in not recorded at all. scenes with strong backlighting where color and brightness balance is extremely difficult. Smooth Streaming mode fur- Experience the difference ther ensures a high-quality live feed. In the new and interactive Panomera® simulator, users can The Dedicated DeepinView cameras are available in 2, 4, now see for themselves how the patented multifocal sen- 8, and 12MP resolutions for customers to choose from. sor technology Panomera® from Dallmeier addresses this problem. Up to eight sensors with different focal lengths More practical and deployable features (multifocal) capture both nearby and distant image areas in high resolution. An intelligent ‘stitching’ software then Furthermore, metadata is supported to allow third-party runs in the background, merging the individual images platforms to receive data from Prama Hikvision cameras from the camera lenses so that users can capture even large for real-time video analysis or recorded into footage archives expanses or long distances in a constant, precisely definable to enable rapid searching forensic evidence. minimum resolution. Finally, these camera models also offer vibration detec- tion for outdoor use, which detects and notifies users of van- dalism. Experience the Panomera® Multifocal Sensor Effect PTZ is History: Simulator Compares Camera Technologies Dallmeier electronic, one of the world’s leading manu- Panomera® enables a defined minimum resolution over very large facturers of video security technology, introduces an areas and distances, and offers significant advantages compared interactive simulator for comparing megapixel, PTZ and multifocal sensor technology. This enables end users, in- with conventional camera technologies stallers and those who are interested to compare the different SecurityLink India | August 2020 | www.securitylinkindia.com 79 camera technologies and experience the ‘Panomera®’ effect themselves. The task of delivering maximum overview togeth- er with excellent image definition presents a significant challenge for many common camera technologies such as
Product showcase The customer benefits are a much better overview of the situation, simultaneous access capability for many operators in high resolution, and better analysis capabilities due to the high-resolution display of spatial contexts, even over very large areas. One Panomera®camera system thus replaces many conventional cameras and significantly reduces both the infrastructure expense required and the operating costs. Besides many industrial enterprises worldwide, for exam- ple nine of the twelve Russian stadiums which hosted the 2018 FIFA World Cup, 14 of 20 clubs in the English Pre- mier League, more than 19 German cities and many airports around the world rely on Panomera®. AMAG Technology Announces “As organizations return to work and need to support COVID-19 guidelines, Symmetry Mobile will provide a Symmetry Mobile touchless solution that supports multi-factor authentication,” said AMAG Technology, Product Director, Jonathan Moore, Centralized, Frictionless Setup “Organizations can centrally issue and manage mobile cre- Supports Post-Pandemic Working dentials to their entire user base from a remote location, eliminating the need to buy and carry a physical credential Environments and come into the badge office. This supports physical dis- tancing and helps keep employees safe.” AMAG Technology announces Symmetry Mobile, a web credential application designed to be used with Together, Symmetry Mobile and the Symmetry Blue AMAG’s Symmetry Bluetooth readers. Symmetry Mobile Bluetooth reader provide a convenient mobile credential supports COVID-19 and return to work guidelines by pro- management solution, capable of integrating with AMAG’s moting physical distancing and frictionless setup. Symmetry and other access control systems. Enterprise users deploying more than one system will find the solution seam- The Symmetry Mobile credential management platform less, efficient and cost-effective. delivers a cost-effective and convenient solution for organi- zations using mobile devices to gain access to secured doors. Users can have an unlimited number of credentials stored Frictionless setup of a credential eliminates the need to phys- within their digital wallet allowing people who need to ac- ically interact with the security team or visit a badging office. cess multiple sites using different access control systems to The Mobile Credential Portal allows central management of use the same mobile device. the credentials, photos and devices remotely. Symmetry Mo- bile and the Symmetry Blue Bluetooth reader integrate with For added security, Symmetry Mobile supports mul- Symmetry access control and other access control systems, ti-factor authentication when used with a PIN or biometric making it an ideal solution for enterprise users deploying (fingerprint, facial recognition) on both Android and Apple more than one system. iOS devices. Users can type their PIN or use a biometric on their phone, eliminating the need to touch the reader and in 80 SecurityLink India | August 2020 | www.securitylinkindia.com support of COVID-19 guidelines. Symmetry Mobile supports multiple languages, providing a convenient and affordable solution for global companies. Symmetry Mobile is available now in the Apple App Store and Google Play Store.
product showcase exacqVision v19.06 Support for the network loss recording feature is now available with selected and tested ONVIF Profile G-con- Offering Automatic Video Transfer formant cameras. After a network connection has been re-es- Saving Time for Administrators, and tablished, video recorded to a camera’s SD card is automati- Introduces C-CURE 9000 Integration cally pulled into the exacqVision server. Johnson Controls introduces exacqVision VMS v19.06, Configuration of up to three motion zones, each with its with updates that include automatic transfer of video own motion mask and sensitivity settings offers select Illus- after a server failover, a new access control integration, tra camera users an enhanced motion configuration experi- support for ONVIF network loss recording, improved mo- ence. In previous software versions only one motion zone for tion zone configuration and enhanced network security for Illustra cameras could be defined. mobile app users. Exacq Mobile users now have a new option for access- ing video on the NVR without complicated incoming fire- wall rules or exposing the network to incoming connection attempts from unknown sources. A new exacq cloud-hosted relay service is available to connect mobile app users to video without any inbound connectivity to the NVR, en- suring sites can stay cybersecure without giving up easy access to video. The latest version of exacqVision offers Enterprise Man- Digitized Workforce ager customers a more robust failover solution. In a failover Management Suite of scenario, transferring recordings from a spare NVR to the primary is critical, ensuring video can be searched and man- Solutions aged from a single storage location. exacqVision v19.06 au- tomates the transfer of recordings back to the primary server To help Enforce Site Health and in the event of a server failover, saving time for administra- Safety Compliance and Support tors by transferring video, audio, and other data to the prima- ry server automatically once it is reconnected. Remote Operations Additionally, v19.06 presents a much-anticipated inte- Honeywell recently announced a complete, modular gration with the Tyco Software House C-CURE 9000 ac- software solution to help industrial companies enforce cess control and event management system. By leveraging compliance with key health and safety requirements as their bi-directional communication between exacqVision and the employees returning to the workplace, including body tem- C-CURE server, users can now control door actions, search perature checks and automated entry management processes. video using event metadata, and trigger other actions, all from the exacqVision Client. Leveraging Digitized Workforce Management with re- al-time location functionality, the solution facilitates site monitoring compliance in accordance with social distancing policies and enables contact tracing and monitoring of work- er safety. It also includes remote collaboration capabilities to empower company operations with a reduced workforce. SecurityLink India | August 2020 | www.securitylinkindia.com 81
Product showcase industry alike a broader solution for preparedness and situ- ational awareness in the future.” Honeywell’s integrated safety and security solutions with digitized workforce management software creates scalable support services for clients to minimize the risk of exposure and transmission within their workplace while enabling busi- ness continuity and accelerating a managed return to safe operations. ●● Modular solution provides companies with Launching tools to efficiently manage the new operational challenges and assist companies in resuming Wisenet7 Camera operations and enforcing compliance. With Innovative Technologies ●● Incorporates elevated body temperature de- tection, digitized site entry compliance check, Global video surveillance provider, Hanwha Techwin is digitized workforce management, worker safe- launching a new product lineup equipped with Wisen- ty monitoring, and provides remote collabora- et7 to tap into the global markets this month. Wisnet7 is a tion capabilities. SoC developed by Hanwha Techwin, which encompasses 30 years of the core of video surveillance solutions and innova- As part of a broader Plant & Personnel Safety portfolio, tive technology. Honeywell Digitized Workforce Management – Business Continuity and Response solution combines software and The newly introduced Wisenet7 cameras (XNB-9002/ hardware technology to support return to work and transition 8002, XND-9082RV/ 8082RV, XND-9082RF/ 8082RF, to operations. XNV-9082R/ 8082R, XNO-9082R/ 8082R) offer up to 4K high-resolution video providing clear and vivid images suit- The system can support Honeywell thermal camer- able for forensic search applications. as that can be used with systems compliant with NDAA 2019, Section 889 to check for elevated body temperatures In addition to high-resolution, various functions such as and provide input to the access control system. This can ‘extreme WDR’, ‘noise reduction technology’, ‘lens distortion enable operators to restrict entryway access if an elevated correction’ were installed to improve overall video quality. temperature is detected helping to automate the prelimi- nary screening process and reducing manual tasks. This The Wisenet7 SoC includes improved extreme WDR helps optimize the individual and collective risk profiles technology that reduces noise which occurs during the WDR of the workforce. Digitizing the entryway approval work- imaging process. This provides clear and well contrasted im- flow for visitors and returning employees and contractors ages even in extreme back-lighting conditions. enables organizations to onboard the workforce efficient- ly, leveraging workforce management and access control Advanced noise reduction technology of Wisenet7 into a new layer of protection. uses different filters for moving and still areas within a camera’s field of view. This minimizes motion blur and “These new layers of protection help industrial compa- improves edge and color definition of objects, making nies bring their workforce back to work with greater protec- them easier to identify when viewing live video and dur- tions, at the appropriate time,” said Pierre Van Neste, Glob- ing forensic review. al Director of Sales, Plant & Personal Safety, Honeywell Process Solutions, “These protections don’t just provide utility here and now – they give workers, businesses and 82 SecurityLink India | August 2020 | www.securitylinkindia.com
product showcase Wisenet7’s lens distortion correction technology corrects devices with limited physical space to accurately authen- video distortion created through the use of wide angle lenses, ticate people, reduce fraud and protect sensitive data in a delivering video that more closely resembles what is seen contactless way. through the human eye. The new reader core uses standard interfaces that make Cybersecurity is of the upmost importance in the video it ideal for embedding into constrained spaces and bat- surveillance industry. Based on Hanwha Techwin’s 30 years of tery-powered devices. It enables everything from hand-held experience in innovative technology, it has released a product devices, tablets, PCs and notebooks to keyboards, displays, showcasing the industry’s highest level of cybersecurity policy. monitors, and kiosks to be used across a range of applica- tions in numerous vertical markets. Wisenet7 cameras use Hanwha Techwin’s proprietary device certificate issuing system which embeds unique cer- “The OMNIKEY 5127CK Reader Core opens new mar- tificates into each product during the manufacturing process. ket opportunities for partners seeking to incorporate a host Hanwha Techwin’s security policies, including Secure Boot, of new physical and digital use cases that were previously Secure OS, Secure Storage, and Secure Open Platform en- difficult to add due to space restrictions on the devices,” said sure product cybersecurity at each step of the way. Steve Currie, VP and Managing Director, Extended Access Technologies with HID Global, “At the same time, we are “Hanwha Techwin is thrilled to not only custom devel- also making it possible to further simplify development and op SoC, the most important aspect of the camera, but also integration of readers with our comprehensive reader core introduce an excellent camera product to the market,” said a software development kit (SDK).” Hanwha Techwin representative. The reader core accelerates time-to-market with numer- Compact OMNIKEY® 5127CK ous features for ease of integration, streamlined configura- Reader Core tion and flexible connectivity. It includes modular approval certification for wireless devices, efficient power manage- Further Accelerate and Broaden the ment (USB suspend/ resume and remote wake up modes) Partner Ecosystem and external off-board HF/ LF and Bluetooth Low Energy (BLE) antennas or the option to design custom antennas that HID Global recently launched its smallest embedded meet specific embedded requirements. reader module, the OMNIKEY 5127CK Reader Core. The latest addition to the proven OMNIKEY family makes For ultimate interoperability, the OMNIKEY 5127CK it possible for systems integrators, original equipment man- Reader Core supports multiple low and high frequency cre- ufacturers (OEMs) and other partners to embed RFID into dential technologies within a single device and includes Ap- ple’s enhanced contactless polling (ECP) application to sup- port credentials in Apple Wallet. It also supports the latest mobile access solutions via NFC or BLE, as well as iCLASS Seos®, iCLASS SE®, HID Prox®, MIFARE™ Classic and MI- FARE™ DESFire™ EV1/EV2 credential technologies. SecurityLink India | August 2020 | www.securitylinkindia.com 83
Product showcase 12.2 MP Alvium 1800 USB IMX249 sensors. Compared to sensors with the same resolu- Camera tion, the 1800 U-240 has a smaller optical format making it attractive for cost sensitive applications. With Rolling Shutter Sensor and Small Pixel Size The Alvium 1800 U-508 model extends the Alvium port- folio with a fast global shutter IMX sensor at a very good Allied Vision’s new 4k 1800 U-1240 camera offers price/ performance ratio. With the IMX250, the 1800 U-508 high-quality imaging for machine vision applications is almost twice as fast as the 1800 U-507 while offering the same resolution. Allied Vision adds another USB3 Vision camera with a rolling shutter to the Alvium 1800 series. The Alvium Ideal for outdoor applications the compact cameras offer 1800 U-1240 incorporates Sony’s back-illuminated IMX226 various hardware options to make the mounting and integra- CMOS sensor that enables high-quality imaging at 12.2 tion as easy as possible: megapixel and 29 frames per second. Due to the pixel size of ●● Housings: Bare board, open housing, or closed housing. 1.85 μm, the camera combines the high image-quality with ●● Various lens mounts: C-Mount, CS-Mount, or S-Mount a small optical format and thus offers a very good price/per- formance ratio. (not for 508 models). ●● USB connector position: Select between the back panel Versatile USB cameras with Sony Pregius IMX global shutter sensors or the left side of the camera (seen from the sensor side). Together with the 1800 U-1240 Allied Vision releases NXPTZ SERIES2 two other new models in the 1800 U series equipped with Sony Pregius IMX global shutter sensors. The new PTZ Cameras for the Harshest Conditions The Alvium 1800 U-240 comes with the Sony IMX392 CMOS sensor, providing a 2.4 megapixel resolution at 126 Videotec, with over 30 years of experience developing frames per second. Therefore, the Alvium 1800 U-240 mod- stainless-steel video surveillance products for offshore/ els can replace cameras with Sony’s popular IMX174 and onshore marine and corrosive industrial environments, an- nounces NXPTZ SERIES2, the new generation of PTZ full 84 SecurityLink India | August 2020 | www.securitylinkindia.com HD video cameras with high-performance features for out- door preventive security applications in the most difficult en- vironmental conditions. The PTZ range has been completely updated and ex- panded to include visible day/ night super low-light, full HD 1080p-60°ps video cameras with DELUX or SONY FCB- EV7520 technology, capable of producing impeccable image clarity even in the most difficult lighting conditions. New thermal PTZ or dual vision network PTZ models are also available for extreme precision in detection and pe- rimeter monitoring and high-risk environment monitoring and monitoring with poor lighting conditions. The integrat-
product showcase ed thermal video cameras also offer radiometry features for The NXPTZ SERIES2 PTZ cameras can operate in cor- precise temperature readings, useful in monitoring industrial rosive environments, thanks to their solid construction in processes. AISI 316L stainless steel with micro shot-peened and elec- tro-polished surfaces, and the extreme precision adopted Thanks to Videotec Analytics, advanced video analysis during the construction processes. features are now available for these PTZs which will help in outdoor applications by supporting preventive intrusion The IP66/ IP67/ IP68/ IP69 grades, in addition, to guar- detection. antee total protection against harsh weather, allows the de- vice to be cleaned with high-pressure jets of hot water and This new technology, developed end-to-end internally by temporary submersion. NXPTZT SERIES2 maintains max- Videotec, uses very strong algorithms for highly accurate de- imum operating efficiency with temperatures from -40°C to tection and precise and fluid auto-tracking even in the most +65°C (-40°F to +149°F). adverse environmental conditions. The detection algorithm is particularly reliable even with rain, snow, camera vibra- Videotec owns the design know-how for all of its prod- tions, low contrast, sudden changes in light or shadows and ucts and this allows total control of mechanics, electron- in the presence of small animals or insects. ics, positioning, networking, software and firmware. This represents a significant competitive advantage in meeting the needs of personalized solutions or integrations with third-party systems, all with the guarantee of Videotec qual- ity, cyber-security and reliability. The new NXPTZ SERIES2 PTZ video cameras can be License Free Smart VCA for geo-localized on the maps to support the GeoMove and Geo- Selected Supreme Series Move & Track features. The GeoMove feature is very useful Cameras in perimeter surveillance systems and for port traffic control because it lets you capture any target through geographic co- VIVOTEK is making the existing Smart VCA (edge AI ordinates, even in critical visibility or offshore conditions. video analytics) free for the following Supreme series models as of July 16, 2020. In a video surveillance system, the GeoMove feature can ●● Fixed dome cameras: FD9165-HT, FD9365-EHTV, typically be activated using a camera with Videotec analytics on board, or through third-party software such as video man- FD9365-HTV, FD9365-HTVL, FD9165-HT-A, FD9365- agement software (VMS), which provide the geographic co- HTV-A, FD9365-EHTV-A, FD9391-EHTV ordinates of a target and use them to guide the Videotec PTZ cameras to capture the target. The coordinates can also be SecurityLink India | August 2020 | www.securitylinkindia.com 85 sent in the same way using vessel tracking services (VTS - navigation control services) or using radar control systems. Furthermore, PTZ video cameras with Videotec analytics on board can activate the GeoMove & Track feature. In this case, the Videotec PTZ camera that receives the coordinates of the target, thanks to the video analytics, can also recognize and autonomously follow the geo-localized target. Compared to the previous generation, the SERIES2 video cameras can easily connect the PTZ over fiber optics, thanks to the SFP module slot installed directly on the base of the unit.
Product showcase ●● Bullet cameras: IB9365-EHT, IB9365-HT, IB9365- umentation, Freestyle 2 provides immediate real-time vis- HT-A, IB9365-EHT-A, IB9391-EHT ualizations with photo-realistic reality capture capabilities. The result is unmatched confidence that what is captured is ●● 360° cameras: FE9191, FE9391-EV accurate while offering unparalleled access to even the most ●● 180° cameras: MS9321-EHV confined spaces. The above models, when upgraded Smart VCA to Versatile and lightweight, Freestyle 2 can scan distances v6.6 or higher, can have the deep learning based video ranging from 0.4m to 10m or from small discrete objects at a analytics for free. No license file uploading is required for crime scene investigation to entire vehicles (interior and ex- these cameras. terior) as well as interior scenes. This is all made possible by the scanner’s infrared laser, which projects a 100x100 grid of The latest VIVOTEK Smart VCA (v6.6) includes the invisible dots onto the target and is interpreted by two camer- following video analytics functions – line crossing detec- as built into the device’s T-shaped extremities. When used in tion, intrusion detection, loitering detection, face detection, conjunction with the color capture camera, all work in con- unattended object detection, missing object detection, and cert to create photo-realistic images in real time. Combined crowd detection. with a proprietary tracking engine that enables users to make natural movements while scanning, the hand-held device is Freestyle 2 Portable easy to use even for untrained operators. 3D Scanner “We believe Freestyle 2 is the most intuitive, portable Ideal for Fast Photorealistic Reality and easy-to-use handheld scanner on the market today,” Capture and Scene Documentation said David Dustin, FARO’s Director of Industry Solutions, Public Safety, “This compact device is a game changer for with Real-time Display the public safety arena given its remarkable degree of pho- torealism and data capture.” FARO Technologies, Inc., one of the global leaders for 3D metrology, AEC, and public safety analytics has re- Designed for normally illuminated interiors and out- cently released its most portable and advanced handheld 3D door spaces (10,000-45,000 lux) including overcast condi- forensic scanner – Freestyle 2. Ideal for investigators and re-constructionists who require fast and complete scene doc- 86 SecurityLink India | August 2020 | www.securitylinkindia.com
product showcase tions, Freestyle 2 is also capable of generating usable data captures a comprehensive 360-degree view of your surveil- even in complete darkness. Thus, documenting scenes has lance operation. never been easier. In addition, the device’s one-hand oper- ation leaves the operator’s other hand free to open doors, This series can be used day or night and is rich with balance or brace themself against objects for a better, more features such as an integral fisheye lens that provides a stable capturing angle, and provides the ultimate on-scene panoramic image capturing 360-degree views. This cam- flexibility to reach in, under, and around objects. Plus, hap- era eliminates the need for multiple fixed cameras and tic feedback alerts the operator when adjustments are re- the concern of blind spots, especially when monitoring quired to the user’s scanning technique to ensure the high- large-scale areas such as campus grounds. Enhanced with est quality data is always being captured. edge-analytics, alerts such as wrong direction can be con- figured to generate notifications of potential suspicious As a fully self-contained solution, with Freestyle 2 there activity and reduce false alarms. H.264/ H.265 compres- is no bulky computer to worry about, no tablet to carry, no sion considerably reduces file size and allows for the con- annual calibration, and no long cables to trip over or interfere servation of valuable bandwidth. This dome can be per- with the shot. Eliminating these restrictions provides for eas- sonalized to best suit your surveillance needs and can be ier completion of white balance calculations as well as on- easily mounted to a ceiling or wall. A variety of additional site compensation. The device also features a training mode mounting options are also available. that generates a live display of data capture quality along with integrated training videos. “At a time when law enforcement and other agencies are understaffed and under significant time pressure, in- vestigators and re-constructionists around the world stand to gain significant benefit from our innovative and intui- tive Freestyle 2,” added Dr. Michael Carris, FARO’s VP of Product Marketing. V8360W Panoramic Network Dome Camera Series With Full HD and Advanced Video Content Analysis Vicon Industries, Inc., designer and manufacturer of “Our new V8360W panoramic camera will be an impor- video surveillance, access control software and hard- tant addition to our extensive camera line, so we’re thrilled to ware and cameras, recently introduced its new V8360W incorporate superior 360-degree surveillance into our prod- panoramic network dome camera series. Enhanced with uct offering,” said Bret McGowan, Senior V.P., Sales and advanced video content analysis, it is designed to facilitate Marketing. the security operation by providing complete coverage for proactive responses. Available in 6MP and 12MP (4K) res- SecurityLink India | August 2020 | www.securitylinkindia.com 87 olution models, the camera and fisheye lens combination
Product showcase Aero Controller Platform ers by including all required hardware, firmware, software and development tools. Benefits for users include: Bringing Flexibility of Open and ●● Easily adaptable to evolving requirements: Users can Interoperable Access Control Solutions to Smaller Businesses choose from a large variety of access control software providers when deploying solutions. Systems are also Building on the success of HID’s Mercury, HID Global easy to migrate to new software and highly configurable recently announced the HID Aero® platform featuring to dynamically enhance situational awareness. its next generation of open-architecture intelligent control- ●● Lower installation and maintenance costs: HID Aero lers that increase choices for a wide range of businesses enables remote management capabilities with HID read- while future-proofing access control investments as require- ers supporting open supervised device protocol (OSDP), ments change. including its recently announced Signo readers with built-in support. This minimizes the need for field in- “HID Aero is providing a broader market with features spection and reconfiguration. that were generally available only in solutions for larger or- ●● End-to-end security from credential to host: HID ganizations, while eliminating the ongoing cost and com- Aero brings to smaller businesses many features general- plexity of designing, manufacturing and maintaining pan- ly available only in enterprise-class solutions, including el hardware at the same time,” said Nelson Fung, Product host and controller authentication, encryption to protect Marketing Manager, APAC, Physical Access Control Solu- keys and sophisticated threat detection. tions with HID Global, “It also brings end-to-end security ●● Trusted reliability, proven technology: Based on HID to everyday applications with encrypted communication and Mercury panel hardware and system technology, the du- threat detection, and robust features to meet corporate com- rable controllers fit in the same footprint as earlier HID pliance.” VertX® controllers and are backward compatible with HID VertX modules to simplify upgrades. Based on HID’s Mercury hardware used in more than four million panels shipped globally, the HID Aero platform CEM Systems AC2000 speeds development time for access control solution provid- v10.3 Security Management System With Covid-19 Response CEM Systems AC2000 v10.3 release includes Cov- id-19 response features, the powerful customer report generator and support for the new CEM Systems EIOC400 input output controller Johnson Controls has released CEM Systems AC2000 v10.3 that offers new features to assist an organisation’s response to Covid-19. Other enhancements in v10.3 include the new AC2000 car parks application, a powerful custom 88 SecurityLink India | August 2020 | www.securitylinkindia.com
product showcase report generator and improve- The applications have a similar layout to the client appli- ments to AC2000 Web applica- cations but with the benefit of not requiring workstation tions. software to be configured. ●● The new ‘Remarks’ and ‘Card Status’ fields in AC2000 A number of new hardware Personnel provide improved visibility and reasoning of enhancements have been re- current card status and historical changes. leased alongside AC2000 v10.3 including the CEM Systems Hardware enhancements released alongside AC2000 DCM400 PoE power supply unit v10.3 include: and CEM Systems EIOC400 in- put output controller. ●● The Ethernet Input Output Controller (EIOC400) from CEM Systems is an intelligent input monitor control- In response to the global ler, designed to monitor entrance, exit points, and any Covid-19 pandemic a number other sensor that may need to be remotely monitored. of the enhancements have been It provides a flexible means to monitor and control a developed in AC2000 v10.3: range of external equipment used in conjunction with AC2000, and contains a number of installer led features ●● Organisations that find they and improvements including intuitive graphical wiring need to change or reduce overlay, on-board touchpad and LCD display for ease of employees working hours installation and maintenance. can now simplify the process of updating the access lev- el and time zone of a large group of cardholders via a ●● The CEM Systems DCM400 door controller is now batch update of access level and time zone in AC2000 available with power over ethernet (PoE) power supply Personnel. options. This adds to the power options available with the DCM400 (12V power, 24V and now PoE power ●● A new contact report has been added to the AC2000 re- supplies) and eradicates the need to provide local mains ports application which can be used to help an organisa- power at the door. tion, as part of a contact tracing process, to identify what users may have come into close proximity of a confirmed ●● Support for STiD OSDP readers, adding to the range of Covid-19 person of interest. secure OSDP readers available for use with CEM Sys- tems AC2000. ●● Automatic reactivation of access removes the need for the system administrator to manually process any reac- SecurityLink India | August 2020 | www.securitylinkindia.com 89 tivation requests. This helps to ensure that any returning staff will not be delayed on their scheduled return to site. Additional AC2000 v10.3 enhancements include: ●● The new AC2000 car parks client application that helps improve resource allocation by ensuring only valid/ per- mitted cardholders can access the permitted car parks at the allocated time. ●● The powerful custom report generator tool with intui- tive graphical interface. Database tables can be dragged and dropped into the custom report canvas with the op- tion to automatically or manually join tables. Reports can be configured to include certain columns and claus- es can be added to refine the report results further. ●● The addition of AC2000 WEB time zones and holidays application and AC2000 WEB devices application en- hances the AC2000 WEB offering from CEM Systems.
National Roundup Annual Subscription: 2000/- for 12 Issues (Courier/ Postage charges extra) “Security Link India” payable at New Delhi dated__________ * Please subscribe through admin@securitylinkindia.com WE ARE UPDATING OUR DATABASE For free listing in Database: For Advertisement Contact: editor@securitylinkindia.com * Send your detail to admin@securitylinkindia.com Security Link India, H-187/5 (1st Floor), Jeevan Nagar Market, Kilokri, Opp. Govt. Boys Sr. Secondary School, Near Maharani Bagh, New Delhi-110 014, INDIA • Tel: +91 11 26342237 • Telefax: +91 11 42828080 • Website: www.securitylinkindia.com 90 SecurityLink India | August 2020 | www.securitylinkindia.com
Offering COVID-19 Discount on Advertisement & Annual Subscription Flat 30%
Search