securitylinkindia

MicroDome® G2 Camera Series With Integrated IR Models

Arecont Vision® announces the expansion of the compact MicroDome® G2 ultra-low profile camera family with the immediate availability of new models with built-in infrared (IR) illumination. “Integrated IR is the latest capability added to this extremely compact camera series for professional video surveillance,” said Brad Donaldson, Vice President Product Development, for Arecont Vision, “No other dome camera of this size offers customers as many choices and advanced features as the MicroDome G2 series.” MicroDome G2 with IR offers a wide range of models with 1.2MP, 1080p, 3MP, or 5MP resolution choices. Lens options range from 2.1 to 16mm, supporting the widest possible surveillance application requirements. Remote focus simplifies set-up and significantly reduces installation time. The installer can mount the MicroDome G2 camera on a wall, ceiling, or structure, points the sensor at the area to be covered, and then screws down the bubble. Once off the lift or ladder, the installer selects ‘Short Range Focus’ or ‘Full Range Focus’ from the camera web page for rapid setup over the network, and then fine-tunes the focus if required by the scene. Arecont Vision SNAPstream™ (Smart Noise Adaptation and Processing) technology reduces camera bandwidth consumption in all MicroDome G2 with IR models without impacting image quality. The MicroDome G2 with IR provides outstanding around-the-clock surveillance for both indoor and outdoor applications. The series is designed for applications with challenging lighting conditions featuring a built-in day/ night mechanical IR cut filter and IR illuminators. For environments with strong backlighting, reflections from wet flooring, streets, or puddles, or contrast due to fog, mist, or glare, optional wide dynamic range (WDR) equipped 1080p and 3MP models are available. Built-in CorridorView™ technology provides better coverage of hallways, corridors, and other narrow spaces without wasting pixels on unchanging areas. The MicroDome G2 series features Arecont Vision’s installer-friendly mount enclosures to simplify installation. The rugged, tamper-resistant, die-cast aluminium housing features a polycarbonate dome bubble that is both IK-10 impact-resistant and IP66 weatherproof rated for indoor and outdoor use. MicroDome and all other Arecont Vision cameras run the in-house developed massively parallel image processing (MPIP) architecture on a field programmable gate array (FPGA) integrated circuit. All core features and technologies are developed by Arecont Vision, and installed cameras can be upgraded with new capabilities via remote firmware updates, thereby extending the useful life of the device. By employing the unique MPIP architecture, Arecont Vision cameras do not require the use of common embedded operating systems, nor do they make use of 3rd party code or chip-sets for core features. This approach eliminates the potential risk of hidden back-doors, and the range of other cybersecurity weaknesses widely documented in other camera brands. Arecont Vision cameras are unable to be maliciously repurposed for use in Distributed Denial of Service (DDoS), network penetration, ransomware, and other cyberattacks, or to be used to spread to malware and computer viruses to other network-enabled devices. The MicroDome G2 with IR is ONVIF (Open Network Video Interface Forum) Series S compliant. They are integrated with the industry’s leading video management system (VMS) and network video recorder (NVR) choices through the technology partner program and its MegaLab™ test and certification facility.

Read More

SlashPRO™ Slash Resistant Clothing

Protecting Those Who Protect Others SlashPRO™ slash resistant clothing is designed to protect frontline professionals working in hostile environments including prison and correctional facility officers, homeland security professionals, police officers and those in the private security sector. Slashing dangers are relatively frequent for these workers and an occupational risk faced on a daily basis. Rapid blood loss often leads to fatality, and it is the SlashPRO™ mission to protect professionals at risk, with a range of easy-to-wear, slash and cut resistant clothing. One of the most recent reported incidents took place at the Maghaberry Jail in Northern Ireland which saw a female prison officer being slashed across her face. The SlashPRO™ clothing range provides extensive protection to body and limbs, also covering the five main arterial areas: Radial (wrist), Brachial (along bicep), Carotid (throat), Axillary (beneath arm pit) and Femoral (thigh region). Rusty Keeble, CEO of The Gang Enforcement Company said, “The slash-resistant combat shirt is one bad ass piece of officer protection wear. The design is comfortable, professional-looking and allows you to move freely and naturally.” It certainly took a while to finalise all garment designs and develop full confidence that all customer needs will have been met by the first series of designs. Robert Kaiser, CEO of SlashPRO™ and parent company PPSS Group says, “I am absolutely over the moon knowing SlashPRO™ Clothing has finally been launched. “Following several reported incidents, which have seen officers around the world being slashed and suffering rapid blood loss, we at PPSS Group felt strongly that slash resistant clothing can prevent such injuries and ultimately save lives.” Orders for SlashPRO™ clothing have been taken from highly regarded professionals and companies worldwide, of which many have provided excellent testimonial to the quality of the clothing range.

Read More

Adding HID Technology™ to the Reader Range

Paxton Access, the manufacturer of IP access control and door entry solutions, has added Genuine HID Technology™ to the majority of its access control reader range, in pursuit of market feedback. In addition, for extra convenience, dealers can now purchase nine of Paxton’s most popular readers with pre-activated HID Global® licenses included. These readers are ready to use right out of the box with no extra cost and no additional license required. Genuine HID Technology is one of the most popular credential formats and this update to the company’s reader range helps support the ease of system migration when updating to a new Paxton access control solution. This also provides a cost benefit as users can retain their existing credentials. Gareth O’Hara, Chief Sales Officer at Paxton Access says, “This is something that our customers have told us they want, and we have listened. With the release of this technology, taking over an existing system is even easier. Simply enrol your HID credential in the Paxton system and continue to use them alongside Paxton tokens without changing any hardware. This is great for sites already using this technology as your customers won’t need to buy new credentials, saving them money.”

Read More

L2+ Managed Ethernet Switches

OT Systems introduces new L2+ managed Ethernet switch series which provides IP network surveillance devices’ management functions. The new L2+ managed Ethernet switches provide easier manageability, robust security and embedded Surveillance Device Management (SDM) system to allow users to automatically manage, monitor and deploy the surveillance network system. It offers an easy network configuration; displays the live streaming and graphical monitoring of topology, floor and google map view; and provides real-time monitoring and troubleshooting. The system also supports one-click login and auto discovery to easily classify the third party-device name, IP address, connected port number and link status. The new L2+ managed Ethernet switch series is especially designed for IP surveillance applications. Managing IP network surveillance systems through the L2+ managed Ethernet switches becomes intuitive and efficient.

Read More

Schlage® NDE Wireless Locks Integration

Integration offers users real-time monitoring capabilities using S2 NetBox access control system S2 Security, and Allegion™ have announced S2 NetBox series product support for Schlage® NDE wireless locks. S2 NetBox access control and event monitoring system users can now easily manage and control the locks using Allegion’s ENGAGE™ Gateway and Bluetooth® technology. “We’re excited to offer support for and sell the popular Schlage NDE wireless locks,” said Mike Riegelman, Vice President of Business Development at S2 Security, “NDE locksets, in particular, offer real-time lockdown capability, which is an advancement in wireless solutions.” The integration allows users to manage access control and event monitoring, such as real-time lockdowns, directly from S2 NetBox without requiring third-party hardware. The Schlage NDE combines the lock, credential reader, door position sensor and request to exit (REX) into a single unit. Ideal for interior doors, NDE wireless locks are simple to retrofit into standard doors without drilling additional holes. And, these locks connect directly to a smartphone for quick set up using the ENGAGE mobile app. “The integration with S2 NetBox brings new opportunities to both companies, and most importantly, to our customers,” said Brad Aikin, Electronics Portfolio Leader at Allegion, “The access control system seamlessly works with Schlage NDE locks to provide advanced security capabilities at every opening. Plus, customers enjoy many conveniences of using credentials throughout the building.” NetBox software Version 4.9.08 is now generally available for S2 Security Certified Integrators to download on S2 Support Central.

Read More

SafeNet Trusted Access Simplifies and Secures Access to Cloud Applications

New access management service helps companies mitigate risk with integrated single sign-on, multi-factor authentication and risk-based analytics Gemalto has recently launched SafeNet Trusted Access, an access management and identity protection service, to secure cloud and on premise applications. Powered by a robust risk-based analytics engine, Gemalto’s solution delivers integrated Cloud Single-Sign-On (SSO) and multi-factor authentication (MFA) capabilities so companies can easily implement secure, conditional access and additional authentication levels when outlined in the policy engine. According to recent research, enterprises in 2017 are expected to utilize an average of 17 cloud applications to support their IT, operations and business strategies. With SafeNet Trusted Access a user can log on once to access all approved applications, as defined by the policy for that application. “The adoption of cloud apps is fast becoming mainstream. Yet IT teams lag in their ability to effectively manage and restrict access to these apps and offer their employees the convenience they expect. With SafeNet Trusted Access,  IT Managers can set scenario-based policies linked to associated risk factors and implement step up authentication for a particular application or group of users, depending on the level of sensitivity and role,” said Francois Lasnier, Senior Vice President of Authentication Products at Gemalto, “We built this newest addition on the expertise and success of the award winning SafeNet Authentication Service to support our customers as they migrate their enterprise workflows into the cloud. We designed this next-generation MFA and Cloud SSO platform with the goal of making it easier for IT to align security with business processes.” “Historically, controlling access to resources has been ‘red-light/ green-light’ or binary – you’re either allowed in or you’re not, and once they are in, most SSO offerings are blind to anything a user does once they are granted. By combining analytics with IAM, SafeNet Trusted Access provides companies with the ability to identify anomalies in access patterns that could indicate risk and help prevent data breaches,” said Garrett Bekker, Principal Analyst at 451 Research.” Gemalto’s SafeNet Trusted Access key features include: Scalability: The solution features built-in integration templates making it easy for companies to add new and existing cloud applications as needed. Supports long-term IAM strategy: Companies benefit from a broad range of Gemalto’s stronger authentication methods and form factors such as one-time-passwords and biometrics. Risk-based analytics and detailed access policies: Scenario-based policies define access controls, assess whether a login attempt is secure, apply the appropriate level of authentication and require additional security measures when necessary. Visibility: Provides the right level of visibility into workforce identity and access activities & events. Centralized access management: A single pane of glass gives visibility into all access events streamlining security audits, tracking and help desk requests like password resets. Regulatory compliance: IT can ensure compliance with relevant legislation and standards using the solution’s data driven insights on user behavior, access events and policy enforcement.

Read More

Overlay Detection in DIGIPASS for Apps Protecting Mobile Applications

DIGIPASS® for Apps Runtime Application Self-Protection now includes overlay detection to help protect against increasingly common mobile app overlay attacks VASCO® Data Security International, Inc., a leading global provider in digital solutions including identity, security and business productivity, has recently announced its ability to help organizations detect and mitigate mobile application overlay attacks through added functionality in the DIGIPASS for Apps Runtime Application Self-Protection (RASP) module. Overlay attacks are increasingly being deployed to steal user login information. The ongoing attack on Android devices named Marcher has already targeted 117 banking applications. Overlay malware allows attackers to create screens that sit on top of legitimate Android applications and intercept information that can compromise a user’s security and privacy. To help prevent damage during an overlay attack, organizations can use the overlay detection functionality from DIGIPASS for Apps, which offers a library of APIs that natively integrates application security, biometric authentication, risk analysis and more into mobile applications. While the attack is occurring, the overlay detection functionality can close the targeted app and open a browser to notify the end user and the organization from which the legitimate app originates. “Mobile malware attacks are only increasing, making it more important than ever for organizations to deploy technology that helps prevent against further damage,” said VASCO President and Chief Operating Officer, Scott Clements, “This kind of real-time, frictionless and convenient security for mobile transactions helps organizations mitigate risk and better ensure trust in the digital world.”

Read More

Fiberpatrol® For Buried Perimeter Detection Applications

Covert and undetectable fiber optic sensor ideal for protecting long perimeters and borders Senstar has recently announced FiberPatrol for buried perimeter detection applications. Using a buried fiber optic cable and a centrally-located sensor unit, FiberPatrol provides covert detection of intruders, vehicles, and tunneling for up to 72km (45mi) per processor. “The advanced technology behind FiberPatrol has been protecting critical infrastructure around the world for many years as a fence-mounted intrusion detection solution,” said Product Manager Stewart Dewar, “Engineered for buried applications including pipeline protection, we can now provide the same reliable and accurate detecting and locating abilities, with intruders not even aware they are being monitored. These buried detection capabilities further broaden Senstar’s market-leading portfolio of perimeter intrusion detection products.” FiberPatrol detects and locates a wide range of above and below ground threats associated with long perimeters including borders. From someone walking, running or crawling above the sensor, to heavy vehicle engine vibrations, to digging and tunneling activities, FiberPatrol pinpoints intrusion attempts to within ±10 m (±33 ft) accuracy. FiberPatrol requires no powered or conductive items in the field, making the sensor completely immune to EMI and lightning and intrinsically safe in the presence of explosive atmospheres. It can accurately detect and locate intrusions even when there are multiple simultaneous intrusions or in the presence of spatially-distributed environmental noise that would mask the detection capability of other long-range fiber optic sensors. As well, the system’s resilient design allows detection to continue right up to the point of a cut in the sensor cable. FiberPatrol for buried applications is ideal as a standalone protection option or as an additional layer of protection for a fence line.

Read More

Packaged Workforce Optimization Solutions For Mid-Sized Contact Centers

Company’s proven, flexible WFO solutions available to mid-market contact centers in the cloud or on-premises mid-market solution packages available through extensive channel partner network Verint® Systems Inc. has recently announced the availability of its workforce optimization offerings for businesses with small and medium-sized contact center operations. Available either in the cloud or on-premises, the mid-market offerings include best-of-breed capabilities across Verint Workforce Optimization™ solutions. Through its mid-market solutions for Workforce Optimization (WFO), Quality Management™ (QM) and Workforce Management™ (WFM), Verint makes key, award-winning functionality readily available to mid-market contact centers at attractive price points. These powerful, easy-to-use software and services packaged solutions include fully-unified WFO software, a single user interface, and unique business process workflows right out-of-the-box. In addition, other Verint solutions such as Analytics-Driven Quality™, Speech Analytics™, Desktop and Process Analytics™ and Knowledge Management™ can be added and licensed by individual product. Designed to help ensure simplified, rapid deployment, the Verint mid-market solutions integrate with all leading automatic call distributors (ACDs), providing channel partners with maximum flexibility and giving organizations even more options and choice of integrated platforms. Leveraging these solutions, businesses can gain greater insight and achieve better outcomes for enhancing customer interactions and experiences, heightening engagement, improving processes, optimizing workforce performance and managing costs. Mid-market solution packages Verint mid-market solutions include robust functionality, an intuitive interface and streamlined navigation to drive maximum uptake and usage and help ensure a lower total cost of ownership. Solution packages include: Verint Quality Management helps contact centers move away from random call sampling by efficiently selecting and evaluating large numbers of interactions across business channels based on business drivers and relevance, employee performance and customer input. Verint Workforce Management provides an easy-to-use, web-enabled solution that simplifies the complex task of staff forecasting and scheduling, without the expense and administrative burden of thick-client solutions. Verint Workforce Optimization allows organizations to enhance business performance and the customer experience using QM, WFM, performance management and e-learning capabilities to enable effective staff scheduling, the capture and analysis of customer interactions, the ability to manage and measure employee performance against goals, and the need to deliver targeted learning and development for skill enhancement and employee development. Verint has formed an extensive network dedicated to support the mid-market through channel partners serving the contact center market. “Verint continues to advance its commitment to organizations with contact centers of all sizes, and is uniquely positioned for the growth opportunity in the mid-market through our extensive partner network and cloud-based, ACD-neutral packaged solutions,” says Nancy Treaster, SVP and General Manager, Strategic Operations, Verint, “Strong reseller relationships are an integral part of our strategy for growth, and we recognize that our partnerships are a critical path to key end users in both geographic and vertical markets.”

Read More

H4 Platform with H4 Thermal Camera

Combination of built in self-learning video analytics and thermal imaging provides accurate detection in a wide range of environments The Avigilon H4 Thermal camera line provides exceptional detection and performance with the combination of thermal imaging and Avigilon’s patented self-learning video analytics. Operating beyond the visible spectrum, the H4 Thermal camera line is designed to detect the movement of people and vehicles even in areas with poor visibility, challenging lighting conditions, absolute darkness and partly camouflaged objects. Through Avigilon self-learning video analytics, operators receive notification of detected activity that may require further investigation, helping them take decisive action when needed. “With our patented self-learning video analytics built in, our H4 Thermal camera line is designed to help our customers detect, verify and act on events in locations where environmental conditions are challenging,” said Mahesh Saptharishi, Avigilon’s Chief Technology Officer, “Expanding our product line with thermal imaging technology continues to broaden the range of Avigilon  solutions available to meet our partners’ and customers’ needs.” The bullet-style, all-environment design is outdoor ready and well suited for a wide range of applications including critical infrastructure, transportation and government. The H4 Thermal camera line is expected to be available for order in the fourth quarter of this year.

Read More