securitylinkindia

Gemalto Automated Border Control in Colombia

Gemalto and INCOMELEC SAS, a Colombian partner, are transforming the immigration and border crossing in Colombia through biometric iris verification implemented by Migración Colombia, the country’s border control agency. This innovative solution was launched in February with a pilot program at Bogota’s El Dorado International Airport. The Automated Border Control (ABC), known locally as ‘BIOMIG,’ is benefiting both citizens and border officials. Gemalto’s ABC speeds identity authentication and significantly reduces bottlenecks in the immigration process while maintaining strong security control for each traveller. Gemalto ABC Iris solution secures and speeds immigration A growing majority of airport arrivals in Bogota – up to 60% – are Colombian citizens re-entering the country. This often results in long immigration queues, congested waiting areas and travel weary citizens. ‘BIOMIG’ mitigates these challenges while complying with Colombia’s stringent border control security requirements. How does it work The solution integrates a highly intuitive iris recognition terminal that allows swift long range iris capture from 35 to 45 centimetres away. This eliminates physical contact with the terminal and improves comfort and ease of use. To use the service, Colombian citizens aged 12 and older only need to visit one of 30 BIOMIG enrolment stations at the airport as they exit the country. In less than one minute, their unique iris scan is securely registered with Colombia’s Border Management System (BMS). When re-entering the country, previously enrolled citizens simply enter their national ID number on a touchscreen integrated with an automated door barrier by INCOMELEC, SAS. After a quick glance at the iris reader terminal, identity is validated via a secure digital process and the automatic doors swing open. Gemalto has supported Migración Colombia with state-of-the-art solutions for secure document authentication, biometric solutions and software integration for their border operations. “The challenge with border control solutions is to minimize and simplify immigration procedures while improving ease, speed and convenience for end users – without compromising security. This is exactly what the ABC Iris solution achieves,” said Francesc Ortodo, Sales Director for Government Programs Latin America at Gemalto, “Colombian citizens can now benefit from strong biometric security within a trusted environment.”

Read More

Dahua Goes GDPR Compliant

Dahua Technology has become GDPR compliant and received the certification for its IP video products from TÜV Rheinland just a day before the General Data Protection Regulation (GDPR) comes into effect i.e., 25 May 2018. It means that its IP products are in full compliance with GDPR. Dahua is one of the first companies on the globe which has achieved this certificate. The General Data Protection Regulation (GDPR) is a set of new law by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union. It establishes strict, high-level, wide-scope protection standards for personal data. Wherever a company is located, as long as it processes personal data of an EU citizen during the provision of products or services, it must comply with GDPR. TÜV Rheinland, an internationally renowned independent third-party testing, inspection and certification organization, held Cyber Risk Management Forum 2018 in Shanghai on 24 May 2018. The forum, started by Lutz Frankholz, Executive Director of TÜV Rheinland Greater China, is among the highest level that is themed on information risk in China and is joined by professionals from both business and academic circles. Dahua Technology participated in the forum together with many outstanding companies from multiple industries. They successfully applied for GDPR personal data protection standards and TUV Rheinland’s IoT security and privacy protection standard for products that are being shipped globally, including those that are shipped to countries and regions outside of EU. Zhang Junchang, Director of Cybersecurity Product Line of Dahua Technology, received certification towards IP video products on behalf of the company. This means the Dahua IP products are in compliance with the GDPR (EU, 2016/679) and meet the TÜV Rheinland 2PfG 2624/06.17 standard (covering IoT security and privacy protection requirements) which are world-class in information security and privacy protection. This allows Dahua Technology’s global users to enjoy surveillance products that have the same protection level as those in EU. This also means that customers who use Dahua Technology’s certified IP products are able to meet the GDPR standard. The certification procedure is closely related to the company’s whole management system. Its smooth carrying out showcased Dahua Technology’s emphasis on product quality and compliance. Dahua will relentlessly make use of its internal source as well as professional third-party partners like TÜV Rheinland to create more value to its customers and users. Dahua has also shared a white paper named ‘How Can Dahua Products Help Users Comply With GDPR.’

Read More

VIVOTEK Tackles The Dynamic Challenges At Canadian Warplane Heritage Museum

“ It is far better to face bullets than to be killed at home by a bomb,” read out a World War I poster on display at the Canadian Warplane Heritage Museum. The poster gives its visitors a glimpse of how security, from outside and from within, had been an urgent need then, and how little things have changed as more of the same is required even today, albeit in a different form. But as we near the centennial celebrations of the iconic war, VIVOTEK has ensured that at least the glorious remnants of the era are safe and secured in the museum as they once made their homeland. In a bid to enhance its security, the heritage museum has deployed VIVOTEK’s sophisticated surveillance systems to effectively counter the modern-day challenges, securing the memorabilia from acts of theft, vandalism and pilferage. The deployment has been done through VIVOTEK’s Hamilton (Ontario) channel partner and regional leader in surveillance and security systems, A. S. Security & Surveillance, Inc. Securing a space, however, is not an easy task, particularly if it is of such a massive size as the Canadian Warplane Heritage Museum. The spectacular museum, for instance, is home to about 50 aircrafts, an extensive aviation gallery, and an exhibit gallery, besides a 400-vehicle parking lot, constantly moving crowd, and specific regions with contrasting lights and blind spots which could emerge as a soft target for the masked mob that has been lately defacing properties in Hamilton. VIVOTEK has tackled the dynamic challenges presented by the museum by tightening the security framework with sixteen network cameras. This includes the deployment of IB836B-HT bullet cameras having 2 megapixel full HD sensor (with 30 meter ranged built-in IR illuminators) that leverage WDR and SNV technologies for high contrast and low light environments. These devices, being rated with IP66 and IK10 standards, can also withstand rough weather and direct impact on them. Its ND9541 network video recorder, on the other hand, is a H.265 (high-efficiency video coding) recorder that comes equipped for up to 32-channel network and 4 hard disk drives for efficient and adequate storage. The updated surveillance system at the museum also includes VivoCam Layer 2+ managed PoE switch (AW-GEV-264-370) to provide uninterrupted power backup for all cameras. The building structure also required range extension through PoE extender AP-FXC-0210 for two cameras located indoor using the daisy-chain installation. Commenting on the surveillance blueprint Anthony Stayrer, the Director of A.S. Security & Surveillance said, “In our almost a decade-long reselling experience and being voted the #1 security company in Hamilton, we have never experienced the superlative quality and functionality of the equipment deployed and the level of sophistication extended by VIVOTEK in terms of service delivery. What serves as an icing on the cake is being able to complete the entire surveillance enabling operations within the tight 48-hour constraint that we had to adhere. Our collaboration with VIVOTEK has, in its truest essence, established a new benchmark in establishment security and we look forward to more such collaborations in the future.” VIVOTEK Canada tech support and representative, Oliver David stated, “We are delighted that our business associate and the end-customer are both deeply contented with our surveillance offerings. Our tie-up with A. S. Security & Surveillance has been effectual in delivering the desired result and we are glad to have the brand on-board as our gold partner.” “Establishing surveillance and security framework at Canadian Warplane Heritage Museum is an embodiment of the expertise that VIVOTEK holds in such deployments. Today, much like Canada, India also faces a unique challenge. Multiple statues are being vandalized throughout the country. We believe that preserving our legacy is an integral factor in building the nation and India needs it more right now than it has ever before. As various countries are preserving their national heritage using advanced surveillance systems, such systems can also help our center and state governments in ensuring better security and surveillance in public spaces “ – Sanjeev Gulati Country Manager – India & SAARC, VIVOTEK  

Read More

Implementing Mobile Credentials in the Access Control Market

There are several factors that make the widespread adoption now difficult, the first of which is the pitfalls of different phones and the platforms on which they run. Not everyone carries the same type of phone – or even a smartphone. When you have 3,000 people in a company who all need credentials to access a facility, it is rarely feasible to give each person a phone that will run the application needed. Another consideration is how to handle visitors and contractors that might require short- or long-term access to a facility. Perhaps more obvious is the challenge that emerges when a mobile device runs out of battery, thereby rendering it useless when trying to access a facility. Considering privacy Another challenge end users face when considering implementing a mobile-based access control solution is the concern employees may have regarding privacy. When using mobile credentials on a private mobile phone, there’s a certain level of access an employer has to the phone. Employees are concerned as to how employers are using their information with regards to location-based data, or where an employee is at any given moment. Naturally, with this level of access to personal information, there’s going to be a concern about how that data is used. While there is definite movement in the direction of mobile credentials across enterprises, another issue is the proprietary nature of the technology. Since it’s still emerging, there are no common standards in place that police can use, so end users that choose to invest in the technology are often locked into a single manufacturer’s system without the flexibility that more open-platform solutions allow. Addressing these concerns Many end users are now shifting toward a hybrid approach to access control that utilizes both traditional badges that allow access to a facility, as well as the option to use their mobile device as their credentials. The argument is that many employees will have their phones on them at all times, but might not always remember a badge or ID. Having the option to use either solution is becoming a more widespread use of mobile-based systems. With regard to privacy concerns, it’s important for security managers to work closely with human resources and other C-level executives to implement best practices for the use of this technology in an effort to better inform employees and guide implementation. Customer point-of-view We are seeing an increasing customer demand for mobile credentials, so it’s important to understand their needs when discussing which access control solutions are ‘right’ for an organization. Many want the flexibility to offer multiple options to their employees, but again, have to consider the privacy implications as well as the technology involved in trying to implement such a solution. Another consideration is the actual physical implementation. Most mobile based credentialing systems are built with bluetooth, which has a long-range capability; and this can be problematic. For example, turnstiles that are in close proximity to each other might pick up credentials that are a greater distance away. Standards such as near-field communications (NFC) that can be found in a lot of devices can address some of these concerns, but NFC’s ability to be used openly in an iPhone environment is not fully established and therefore isn’t a viable option unless the same kind of devices is used across an organization.

Read More