securitylinkindia

Genetec Helps Small and Midsized Bank Branches Unify Security

Genetec Inc. has recently announced the immediate availability of a new unified solutions bundle for financial institutions, an all-in-one offering, specifically tailored to help banks with small and mid-sized branches and automated teller machines (ATMs) manage security, make more informed decisions, and collaborate to close incident cases more quickly. The unified solutions bundle combines several easy-to-install, enterprise-class Genetec products, at an affordable price for financial institutions. “Traditionally, financial institutions with small or midsized branch locations and ATMs worked with multiple physical security technology and analytics suppliers to combine solutions that were not designed to work together. This created inefficiency and introduced cybersecurity vulnerabilities, challenging maintenance, and operational situations which increased costs. Our unified solutions bundle solves that problem by bringing security, operations and business intelligence together into one single interface, reducing operator overload and improving efficiency. With Genetec Security Center at the core of this bundle, banking customers can be confident knowing that their solutions are deployed following cybersecurity best practices,” explained Rob Borsch, Commercial & Practice Lead at Genetec. With this new bundle, and the Genetec Security Center unified platform at its core, financial institutions will be able to make the most of their existing security infrastructure to develop strategies to attract and retain customers, reduce fraud losses, and close cases quickly. By using embedded analytics tools to analyze the vast amounts of data and video already being collected, they can make better-informed decisions about staffing and how to manage the flow of people. This can help them become more competitive and have a significant positive impact on their customers’ journey. A unified system can also improve overall branch security by giving personnel all the information they need including alarms and associated video footage, on mobile devices or at their central operations center so they are ready to respond quickly. In an emergency, an IP-based physical security system that includes a map-based interface showing a location’s cameras, doors, and other devices, can make all the difference. The Genetec unified bundle features a Streamvault™ turnkey appliance, pre-loaded with the Genetec Security Center unified platform, and other software including: Omnicast™: An IP-based video management system that goes beyond simple monitoring. Combined with video analytics, it helps secure and better understand banking environment with real-time access to surveillance video from any computer or smart phone. Synergis™: IPbased access control to manage the movement of people throughout buildings, while securing doors and restricted areas in bank branches and administrative offices. AutoVu™: An automatic license plate recognition solution that facilitates vehicle identification. This can assist your marketing and operations team to link specific vehicles to customer or employee profiles in the database, or identify unknown vehicles in your parking area. Camera Integrity Monitor module that alerts customers when a camera is either moved (pointed in a different direction), covered, or tampered with. Retail Sense™ advanced consumer intelligence to empower banks by using existing security data to deliver insights and help transform customers’ in-branch experience. These new insights enable one to make informed, real-time decisions, that increase consumer engagement and profitability by analyzing the data your system already gathers. A free 90-day license of the Genetec Clearance™ digital evidence management system to speed up investigations by securely collecting, managing, and sharing digital evidence from various sources with others. Optional add-ons include: ATM transaction integration (to correlate ATM activity with video footage), Intrusion alarm panel integration plug-in (efficiently respond to intrusion breeches), Sipelia™ intercom hardware & licenses (SIP-based communications between operators and intercom devices), Federation connection license (Connect different sites together), Extended 5 -year warranty, Analog encoder card(s) for 8, 16, 24 or 32 channels.  

Read More

Axis Bolsters Africa’s First Fully Automated Drill Fleet

Mission Kumba, Anglo American’s iron ore business in South Africa, cemented its position as an early adopter of new technologies when it implemented automated drilling on the Kolomela Mine. This project was the first fully automated drill fleet in Africa which aimed to increase utilisation, improve safety and performance, boost reliability and productivity, and save costs. The remote command of mining equipment relies on line of sight through remote drill monitoring to honour the guidelines of the Mine Health and Safety Act, specifically guidelines towards trackless mobile machinery (TMM). As the preferred supplier to Kumba Iron Ore, Sedna Industrial IT Solutions (Sedna), were asked to provide visual monitoring to support this. “The project’s conceptual phase required creative thinking that led to custom-built products. Sedna provided basic specifications, with minor on site changes to products once introduced and thoroughly tested. Furthermore, their Axis partnership meant we had superior technology and hardware to support the project requirements. Their combined commitment and technical ability is phenomenal and contributed to the overall success of the project” – Pieterjan le Roux Technologist Engineering at Kolomela Mine, Kumba Iron Ore Solution As an Axis development partner, Sedna naturally collaborated with the market leader in video surveillance. The team has worked together on several mining applications in the past, and Sedna relies on the exceptional durability and performance of the Axis products. AXIS P3905-RE network cameras were installed on the drills in order to replace the onboard visibility during the ab sence of an operator, and the Geo-Cam was used with AXIS Q6115-E as the base platform for drill and bench monitoring, from a distance providing a 360 coverage of the entire working area of the drill. AXIS Q8722-E were used as the base for the thermal Geo-Cam for drill and bench monitoring in poor light or high dust conditions. Result The custom-built, world-class mining application reinforces the project through real-time visual monitoring for automated process optimization and early problem detecting. As a result, the Kolomea Mine is benefited from increased efficiency, improved safety, minimized downtime and lowered operating costs. Remote drill visual monitoring Automated drilling presents many benefits as it promises to increase efficiency and reliability, while improving safety, minimising downtime and lowering operating costs. It is best suited for remote and inaccessible locations, and allows for more accurate pressure control and more rapid response to drilling anomalies. Combined with visual monitoring through high definition cameras, a single person can operate multiple drills from a control room on a 24/7 basis. Axis development partner, Sedna Industrial IT Solutions (Sedna), specialising in mining-based systems was approached by Kolomela Mine Project to provide visual monitoring support. Peter Dormehl, Director of Sedna Industrial IT Solutions, has partnered with Kolomela over the years on technical mining solutions, and therefore understood the requirements and client preferences. Dormehl commented, “In making our recommendations to Kumba’s team, we put Axis forward as the IP camera partner of choice. Sedna has worked with Axis for almost a decade and we are confident in their product support. We know their hardware can survive demanding environments, as we’ve deployed their cameras in mining operations worldwide.” Superior technology and hardware A few years ago, Sedna built a Geo-Cam for monitoring operations within environments such as opencast mines, where there is no cabling infrastructure. The robust, mobile device is solar powered and locates positional information or tracks a moving object with GPS. The camera communicates via industrial wireless LAN and can be controlled (Pan, Tilt, Zoom) remotely, allowing for monitoring from remote operations. “Part of our comprehensive solution to Kolomela was to install 7 Geo-Cams, which were used with AXIS Q6115-E network cameras as the base platform for drill and bench monitoring, while AXIS Q8722-E was used as the base for the six thermal Geo-Cams for drill and bench monitoring in poor light or high dust conditions. In addition, we installed outdoor-ready AXIS P3905-RE on the drills, as they are ideal for onboard surveillance. This is recorded and managed on a Milestone platform with the Geo-Cam software,” explained Dormehl. Automatic success “ The drill project deployment was rolled out over eight months by a strong, competent team of experts who helped contribute towards ensuring that our automated drilling delivers against an ambitious growth strategy,” concluded Sipho Mathonsi, Manager Engineering at Kolomela mine.  

Read More

Vanderbilt Hospital Security

When we think about ourselves or a loved one becoming injured or ill and needing professional care, we’d like to envision a hospital or healthcare facility as a place that is welcoming, comforting and safe. In times that we’re most vulnerable, we should be able to feel confident that the room we’re in is located within a secure and organized environment. But the reality is that hospitals face a variety of challenges when it comes to streamlining security and mitigating risks, just as other types of large, complex campuses do. With so much ground to cover and people constantly entering and exiting the building, directors of security at hospitals tend to grapple with various concerns such as: Visitor management. At the core of any hospital is the goal of creating an open environment that encourages healing and patient support. But this often means hundreds of ingress/ egress points, varying levels of access and the possible exposure of patient data. Cybersecurity. The aforementioned personal data that hospitals obtain on a daily basis is unfortunately subject to breaches and cyber attacks, especially as the connected network continues to grow and become more complex. These facilities must also adhere to specific privacy laws and regulations, adding another layer to the mix of requirements. Variance. There are often many tasks and processes being performed in a hospital at one time – from controlling contagious diseases to restricting sensitive areas to rushing critical patients around, there’s no doubt that the element of uncertainty can lead to chaos. Access control in hospital security To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, security directors must look to implementing integrated and innovative security solutions; and one of the most important components of any system that’s deployed is access control technology. Utilizing an access control solution enables hospital security officials to break down the facility’s overwhelming size into controllable, role-based zones that come together within one common platform. Access control encompasses not only main entrance doors, but also internal entrances and exits based on location and access level – meaning all methods for going in, out or throughout the facility can be actively monitored. Most importantly, hospitals demand a security system that can withstand the large volumes of traffic generated each day without disrupting critical functions. A traditional key-based system will struggle to keep up with this level of activity, but taking advantage of a more advanced solution, such as Vanderbilt ACT, can provide numerous benefits. Lockdown functionality In the event of an attempted unauthorized entry or emergency incident, it is paramount for hospital security officials to be able to control access quickly and efficiently. Access control systems allow these organizations to ensure security with the push of a button, as well as remotely and instantly obtain real-time monitoring, user management and administration. Flexibility With the many moving parts hospitals must manage, scalability and flexibility are key to maintaining a secure facility. An access control solution can help security officials constantly adjust access rights based on numerous characteristics such as areas of practice and likely working hours. Former employees can also immediately be removed from the system, eliminating the possibility of a threat. Restriction Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and an access control system can make this process easy. Sensitive materials such as narcotics or sterile environments, can be given added protection, and medical files or controlled substances can be protected with electronic access-controlled cabinet locks to create an audit trail in the case of a breach. Convergence While access control is a crucial centerpiece of a hospital’s security system, the ability to integrate additional components and products can create the strongest solution that facilitates complete protection. Incorporating video surveillance, for example, increases situational awareness and allows security administrators to evaluate a situation before it may become a threat such as a door being forced open. Vanderbilt’s ACT Enterprise 2.8 The latest version of Vanderbilt’s ACT Enterprise access control software is an ideal solution to provide the aforementioned benefits to hospitals and healthcare facilities. ACT Enterprise has been designed with ease of installation and usage as primary goals, with scalability and simplicity key characteristics for enhanced efficiency and effectiveness. One of its newest features, the rules mapping engine, enables the advanced configuration of triggers, which can be actioned on events such as input and output change and card swipe outcomes across the access control system. In a hospital, an example of this functionality could include a card reader for doctor badges on the emergency room suite, which would send an alert to the ER team for immediate assistance. ACT Enterprise 2.8 also facilitates simplified integration with Vanderbilt’s SPC intrusion system, which enables hospital security personnel to view high-quality graphical maps on a single screen that shows all access and alarm points from both systems. This type of wireless integration solution makes system expansion flexible, without the disruption of maintenance teams closing corridors or priority areas of a hospital to run cabling or other installation equipment. Access control is key As hospitals aim to balance contending with security challenges and establishing a place that provides a comfortable recovery and visitation options, adopting an integrated access control solution must be top-of-mind. Learn more about how the flexibility of Vanderbilt ACT allows healthcare facilities to easily manage public areas and permit access to restricted areas while preventing unauthorized access.  

Read More

Digital Infrastructure Vs Cyber Threats

It is indeed not only a current fact but also an unavoidable need that no country or economy can survive and progress without having a resilient and robust digital infrastructure as a backbone to support its ecommerce, health, education, agriculture, manufacturing and all service sectors. However more a country has the exposure to digitalisation, more commensurate risk is manifested by virtue of a spurt in probability of cyber and hacking attacks as vulnerabilities or point of intrusion (PoI) multiplies. It is also reported in a study carried out by Huawei that artificial intelligence (AI) could almost double the value of global digital economy to $23 trillion by 2025 from $12.9 trillion in 2017. However, the worldwide scarcity of AI talent is a challenge and threat to this growth. So, a strong cyber security defence for digital infrastructure is a top priority for each country. Latest updates & serious incidents One of the reports in the Washington Post stated that Chinese government hackers have stolen highly-sensitive ‘top secret category’ files on underwater warfare. The files include the data that pertains to a supersonic anti-ship missile meant for the use on US submarines. Though the Chinese Embassy in the US has denied any such incident, it is reported that hackers targeted a contractor who works for the Naval Undersea Warfare Centre, a military entity based in Newport, Rhode Island. As reported, it was related to the project called ‘Sea Dragon.’ So, it is one of the most serious incidents of hacking so far as it has a potential that could bring two countries at loggerheads against each other with serious consequences. One can look at this incident as to what kind of pursuits/ measures shall be taken forward in times to come. People all over the world and now even in India are chugging data like never before. In just last three years, the use of data in India has increased fifteen times. It stood at 4GB per capita on 31 December 2017 which within a year rose to 5.5GB per capita by December 2018. Data has become cheaper and faster. India provides data globally at the cheapest rate and its expansion is fastest. Cyber threats have also increased in the same proportion as hackers do spend energy and resources to remain ahead to the counterparts who design improved defence processes and technologies to counter. About 500 million Indians were online in 2017 and the rate is growing exponentially. The Indian annual growth rate is about four times of the global average which is just 3%, even though India is still considerably underpenetrated compared to China and USA. Half of these online Indians usually make use of social media platforms while about 40% use e-mail and search. It is expected that e-commerce business in India shall become nearly $130-140 billion by the end of 2020. Indian digital economy itself is expected to be about $1 trillion by 2024, and hence, this volume of business shall also be at risk caused by cybercrimes and hacking attacks. In a sensational case, CBI booked unknown officials of the National Stock Exchange (NSE), Securities Exchange Board of India (SEBI), the promoter of a stock-trading company OPG Securities, and an economist and former consultant in the finance ministry for manipulating NSE software to get prior access to the markets after opening, ahead of other brokers by some seconds, to make gains in trade. It is just to make out how serious such incidents could be as it offers serious challenges to a market place globally that deals in trillions of dollars every day. The researchers have discovered a way to crash a person’s desktop or laptop simply by playing a sound through the device’s speakers. Such techniques could disrupt surveillance systems and sabotage medical devices. It has been published by a US and a Chinese university with details of their findings in a paper titled ‘Blue Note: How International Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.’ This discovery is the latest in a long line of methods available to attackers to crash devices remotely, which include symbols and messages sent by a text message or other messaging apps. There is a new crypto-jacking cyber warfare where the injected malware infiltrates target’s systems and converts computers into zombies. In doing so the primary intention of hackers is not to steal information but to mine crypto currencies. It was used against nearly 2000 computers of Aditya Birla Group. One of the symptoms noticed during the attack was of slowing down of the machines. The digital currency that was mined in this attack was Monero. This currency is virtually untraceable and believed to be more anonymous than Bitcoin, the best known crypto currency which experienced huge volatility amid regulatory crackdowns and strong interest from wealthy investors who chose to diversify beyond conventional securities and central bank-backed dominant fiat currencies like dollar and euro. A team of Dutch security researchers recently unveiled some new findings regarding ‘Rowhammer,’ an unintended side effect in DRAM chips that can be used to tamper with an entire computer which could be an effective way to hijack any smart phone. Though Google says that it is still a theoretical concept and not yet used in any attack but it is for sure that the smart phone manufacturers have to use a permanent fix for the same while incorporating them in designs. It is also a fact that the first native blockchain mobile phone by the HTC has been unveiled as HTC-Exodus. The Android powered Exodus device features a universal wallet and hardware support for all major crypto currencies like Bitcoin and Ethereum, and decentralized apps. So, one more new challenge is on the horizon. Though GDPR has been put in place by EU and Justice Krishna’s report on data protection in India is out but there is a lot that needs to be taken care of, and such laws are to be constantly improved and updated keeping pace with…

Read More

Matrix Enhances Financial Services of IndiaNivesh

IndiaNivesh is one of the leading financial service conglomerates in India which is into various aspects of investment banking and consulting business. It plans to emerge as a dynamic, customer-centric and progressive financial group in the country with pan India presence. Having its head office in Mumbai, IndiaNivesh is growing with eight regional offices and 29 branch offices across India. Business challenge IndiaNivesh required eradication of forged attendance data and manual attendance process, as security is a crucial aspect for them. It has been a tedious task for them to streamline and manage attendance data of all employees accurately and perform calculation of error-free salary. Integrating their existing payroll software with the time-attendance software was challenging. Offered solution Matrix offered COSEC Time-Attendance solution with web based architecture, that can help IndiaNivesh in connecting all its regional and branch offices to their head office in Mumbai. Matrix COSEC time-attendance software can get easily integrated with existing payroll software, and hence it can also help the company in automatic salary calculation. Result Real-time attendance of all employees at a centralized location. Integration with its existing payroll software. Ease of implementation using the existing infrastructure. Fraudulent time-keeping is completely eliminated. Accurate in/ out time of each employee. Live monitoring of in/ out timing. Generation of time-attendance and access control reports and charts for all branches. Improved overall productivity of the organization. Continuous operations with excellent service support. Products COSEC Door FOP: Optical fingerprint based door controller for access control and time-attendance. COSEC Door CAS: Card based door controller for access control and time-attendance. COSEC Panel: Site controller to manage multiple door controllers and advanced access control features. COSEC LE Platform: Application server platform for 1000 Users and expandable up to one million users. COSEC LE TAM: Comprehensive time-attendance and leave management module for COSEC LE platform. COSEC LE ACM: Comprehensive access control module for COSEC LE platform.  

Read More

NEC Technologies Advanced Surveillance & Traffic Management System in Gurugram and Manesar

NEC Technologies India (NECTI), a leading player in the integration of IT and network technologies, has been awarded a contract as the master system integrator for installing CCTV surveillance and traffic management systems in Gurugram City. Under the project, selected locations in Gurugram will be fitted with a variety of CCTV cameras to perform traffic enforcement and general surveillance across 115 sectors of Gurugram and Manesar. The project was awarded in March 2019 and is expected to be implemented within this year. To support the implementation of a comprehensively integrated video surveillance system, NECTI will set up IP-based outdoor security cameras across various identified locations in the city. The video surveillance system from NEC will help in enforcing traffic discipline through the use of AI-based analytics software such as automatic number plate recognition (ANPR) and red light violation detection (RLVD). The system will monitor traffic junctions and other sensitive areas to identify traffic offenders and issue alarms. Subsequent e-challans (electronic fines) can be issued to offenders who are captured flouting traffic rules with the help of these systems. In the first phase of the project, approximately 1,200 high definition (HD) and ultra high definition (UHD) cameras are expected to be deployed in over 200 traffic junctions, sending video feeds to monitoring centers 24 hours a day. The project will utilize the dedicated optical fiber backbone currently being laid out by the Gurugram Metropolitan Development Authority (GMDA) using robust ring network topology. Cameras deployed in key selected locations will be equipped with facial recognition technology featuring NeoFace Watch, NEC’s flagship facial recognition software platform, to identify persons of interest and other suspicious elements to support law enforcement efforts. Commenting on the occasion, Takayuki Inaba, Managing Director, NEC Technologies India said, “Gurugram, one of Delhi’s major satellite cities, is host to many leading brands and representatives from across the world, and is widely acknowledged as a finance and technology hub. We are honored to be awarded this project and contribute to Gurugram’s smart city ambitions. NEC aims to leverage our global expertise while bringing cutting edge technologies and established best-practices to Gurugram as a master system integrator. We are looking forward to working closely with the Gurugram Municipal Development Authority to create a better society and a safer environment for its residents.” The Gurugram Municipal Development Authority added, “The current population of Gurugram is estimated to be close to 2.5 million and is expected to grow rapidly over the next few years. We need to constantly aim and strive to work towards enhancing public welfare, and NEC’s leading position in the field of public safety is paramount behind our decision to work with them. We are hopeful that the successful implementation of this project will propel Gurugram into an attractive city to live, work and visit.” NEC brings more than 100 years of expertise in technological innovation to provide solutions for empowering people, businesses and society. Headquartered in Japan, NEC started operations in India in the 1950s, accelerating its growth through the expansion of business to global markets. NEC in India expanded its business from telecommunications to public safety, logistics, transportation, retail, finance, unified communication and IT platforms, serving across governments, businesses as well as individuals. With its Centre of Excellence for analytics platform solutions, big data, biometrics, mobile and retail, NEC in India offers innovative new services and solutions for India and global markets.

Read More

CP PLUS Secures Kumbh Mela 2019

Kumbh Mela – one of world’s largest spiritual gatherings and a mass Hindu pilgrimage of faith – is a highly revered religious event where Hindus gather to bathe in a holy river. The spectacular fair displays uniqueness of the Hindu tradition, culture and historical significance. There are four normal Kumbh Melas, which are held periodically in every three years at Allahabad (Prayagraj), Haridwar, Nashik, and Ujjain. At any given place, the Kumbh Mela is held every 12 years.   The recently held event at Prayagraj is Ardh Kumbh Mela which is held every six years at Hardwar and Prayagraj. The Allhabad Ardh Kumbh Mela, held from 15 January to 4 March 2019, is claimed to be one of the most successfully organised mega event of this calibre – especially in terms of safety and security. A massive 39 sq. km of land area was turned into a temporary city, constructed by nearly 20,000 workers, to provide shelter to millions of pilgrims, sages and ascetics. The whole area had an arrangement of 1 lakh makeshift urinals, and 40,000 LED lights were installed to brighten the ceremony.  Challenges Managing and ensuring safety and security of people in lakhs was not an easy task. Safe movement of pilgrims, monitoring of crowd and dispersals through gates at such a large scale were some key challenges, and hence the concerned authorities planned to implement several security measures considering factors like the expanse of area, number of people, vulnerable spots and methods of security arrangement. There were arrangements of four Police Lines with 40 Police Thanas, three Mahila Thanas, and 62 Police outposts. The authority also employed Jal Police with 3 units along the river stretch, and one Mounted Police Line to ensure seamless pilgrim movement by the river front and in other crucial religious spots. Monitoring that massive crowd in millions to prevent stampede and like disasters also required cutting edge security solutions such as integrated CCTV surveillance system (ICCC). Solution by CP PLUS Collaborating with the UP Police, CP PLUS installed a total of 1,135 CCTV cameras covering 268 vulnerable locations of the expansive 39 sq. kms of area. An Integrated Command and Control Centre (ICCC) was set up, which included 2 sub-command and control centres with 4 video monitoring cells and 20 video wall cubes, well-connected to installed CCTV cameras. The integrated ICCC surveillance solution by CP PLUS helped in the monitoring of crowd activities and provided round the clock surveillance of the entire expanse, preventing any unfortunate occurrences. The ICCC unit was manned by 120 monitoring operators and 30 call centre operators, making the execution of this mammoth-size project by CP PLUS a roaring success. CP PLUS meticulously combined some of the latest surveillance solutions for the event – Video analytics and real-time video analysis for crowd management. Real-time detection and alert algorithm for overcrowded spaces. Automatic number plate recognition (ANPR) system for parking sites. Vehicle detection by vehicle colour/ license plate and date time combinations. Variable message display (VMD) boards. Real-time information dissemination containing warnings, traffic advice, route guidance and emergency messages. Text and graphic based messages display. Integrated traffic management system. The impact With the given safety and security measures, Ardh Kumbh Mela Prayagraj 2019 went on for more than 20 days with reportage of zero mishap. The operators of the integrated command and control centre remotely helped authorities by making live feeds of the vulnerable areas readily available, enabling early alarm mechanism, and providing complete control on the crowd movement with the police personnel. Director General – UP Police, O.P. Singh applauded the efforts of the police personnel and CP PLUS, and said, “We employed all kinds of modern surveillance technologies to make this Kumbh Mela a huge success. Simultaneously, forces – ATS and NSG – were on duty to prevent terrorist’s acts an/ or any other criminal or unpleasant incidents in the fair. Commandos monitored the event via choppers and worked in collaboration with the surveillance provider. For us, it was crucial to maintain safety of the people at the most vulnerable spots without intervening in the fair rituals. We received tremendous support from the designated surveillance teams who enabled us in monitoring such a massive crowd as per our requirement with zero mishap count.”  

Read More

Parekh Integrated Services Adopts Matrix VMS

Parekh Integrated Services Pvt. Ltd (PISPL) is in the business of providing high-quality logistics services that give customers a competitive advantage in the Indian market. Established in 1981, PISPL is a one-stop shop logistics and supply chain service provider in India offering storage and distribution services, freight forwarding, transportation, information technology and cold chain management solutions, along with other value added services to multiple industry verticals. Challenges Parekh Integrated Services Pvt. Ltd (PISPL) has established their operation with more than 1,500 warehouses and distribution setups to cover all the major cities in India for their services. With this expansion, IT infrastructure equipment was procured, including IP video surveillance systems of different reputed brands from different vendors. Over a period, it became costly and difficult to manage different brands procured separately at different locations. Cost of operation also went up due to the technical expertise required for each individual system. PISPL was looking for a centralized solution, which can work with different reputed brands as well as give them a common control of all the video surveillance systems to reduce the technical manpower cost for different systems. Due to low bandwidth at some of the remote locations, PISPL was not able to secure video evidence at a central location. It was required for any kind of post analysis or dispute resolution. PISPL were looking for an occupancy control system in each warehouse/ storage area to manage and control the worker’s presence in sensitive areas. It was getting difficult to do it manually at each location with the increase in number of employees over the last few years. Solution offered Matrix provided video management software (VMS) as the centralized platform to monitor and manage all the cameras from a central location on a single platform, which led to reduction in operation cost. Matrix VMS supports all the camera models of major brands including ACTI, Samsung, SONY, Mobotix, Panasonic, Vivotek etc., along with ONVIF protocol. Using Matrix VMS solution, PISPL enabled the centralized schedule backup at an even lower bandwidth from all locations to the central location. This made it easy to go through the video evidence at a central location and resolve issues in a short time. Another issue of maintaining occupancy up to a certain limit in each zone was addressed by the Matrix VMS Crowd Management feature. All the entry/ exit points were covered with a camera to count number of heads passing through the points. From central control room, using Matrix Smart Client, security can monitor the total occupancy of an area and instruct the team accordingly. Why Matrix? Matrix VMS architecture supports centralized/ decentralized monitoring and management. Matrix VMS interoperable with most of the reputed brands. Possibility of scheduled backup at central location even at lower bandwidth. People counting feature to control zone occupancy Benefits Centralized control and management. Ease of use. Secure evidence. Improve productivity.  

Read More

On-Site Training: An Inescapable Requirement of Security Operations

Basic training within the framework of PSARA 2005 enables security personnel with just elementary knowledge and hands-on experience of manned-guarding; the induction and on the job training (OJT) take his/ her learning curve to some steps ahead. The litmus test of a security team led by a security officer and supervised by a security supervisor begins in the first shift of the day when the team is left to handle the operations at site independently because they have no PCK (previous course knowledge). The old hands with previous experience of handling the challenges pop up round the clock at the new site, while the new client generally insists on 100% change over of the security personnel and does not intend to allow them for any retention from the previous security provider. Besides, the security team who forms the frontline of the personnel in the security envelope is always the first one to either become victim/ hostage, or the rescuer in any kind of terrorist strike or emergency. The statistics show that the immediate reaction to the given incident is often characterized by the panic and/ or fear which cast a dim shadow on the security provider, and security industry as a whole.  So, how can these situations be avoided? What can aid, facilitate and/ or equip the security personnel to react in a calm, composed, measured and calibrated manner until the responsible authority arrives on the scene? The answer to both problems lies in organizing focused, site specific, realistic and regular on-site training at client site, coupled with daily morning and evening briefing by security supervisor and security officer in charge at site. To set the pace of operations, the security providers must ensure to take certain prior actions before they take over the site. They should bring about survey and security audit of the site to identify risks, threats and vulnerabilities; study the security SOPs of the client for the site, and analyze previous incidents and lessons learnt therefrom; put down the post and site instructions in writing with detailed job description (JD) for each post; and make detailed orientation/ familiarization with the peculiarities of the site. The key areas to focus during the conduct of an on-site training to orchestrate response matrix as differentiator are as follows: Drawing out absolute clarity in the roles and responsibilities (PSI) of each man on the ground. Ensuring hands on experience on the entire gamut of the security and safety equipment. Development of demonstrative ability in soft skills, and meet & greet procedures. Mastering continuous flow of info, monitoring, surveillance and reporting procedures. Hold regular mock drills of major emergency handling like fire, accidents, first aid, workplace violence, fall from heights, drowning, earthquake etc. Involve the employees and management in awareness drive on National Fire Safety Day, Women Safety Day, Child Safety Day, Road Safety Day, and demonstrate the expertise of security personnel through the role play technique. Hold day and night surprise checks and penalize the defaulters to enhance compliance of SOP. Hold sessions to analyze the root cause of past incidents and the preventive measures. The vital significance of the on-site training in running the security operations in an effective and smooth manner is indisputable and needs to be implemented by all security providers to ensure a high level quality of service. In conformity with the industry demand and to keep pace with the technological disruptions, the APS Group has custom designed a mobile training van which houses all the essential security and safety equipment, lifesaving first aid appliances, emergency rescue equipment, simulation devices, training charts, and live streaming facility of training being conducted at remote locations directly to the client’s boardroom/ workplace. This innovative and indigenous effort has hit the street with high voltage and is in great demand.  

Read More

Storage Technology: Then & Today, and the Trend

Computer storage systems have seen a massive evolution and transformation over the last 100 years or so. These changes have been dramatic in relation to the size, price and the access speed of storage. These changes have been possible due to the rapid advances in technology, which was initially slow and took years to evolve but later in the last decade it accelerated due to rapid innovations and concerted/ collaborative efforts of the industry giants. These technology advances have revolutionized the way companies, businesses and consumers use storage technologies today – from the most ubiquitous smart phone devices and personal computers all the way to businesses which now have come to rely more on cloud storage services. In this article we try to capture the evolution of storage technologies over the years and examine the fundamental technical reason that has accelerated storage evolution over the last decade. Storage evolution over the last 70 years (Relative to size, capacity and price) The table below highlights the trends in storage. Initially, the advances in technology were slow, mostly led by IBM in the 60s and 70s in the Megabyte revolution. In the 80s and 90s other companies jumped on the storage bandwagon and started the Gigabyte revolution soon to be followed by the Terabyte revolution. Today there are many physical form factors of storage devices from the traditional mechanical hard disk drives (HDD) to non-volatile memory (NVM) or solid-state devices (SSD); however, the fastest and most dynamic revolution is occurring in the cloud. Storage technology evolution over the last 100 years (Another view) There is another view of understanding the evolution of storage technology as well. The diagram below is a pictorial representation of the other view how storage technologies have evolved over the last 100 years. The fastest growing storage technology today Today, most storage systems use some or the other form of a mechanical device for storage which is otherwise known as ‘hard disk drives’ (HDD). HDDs are the dominant technology for several reasons such as very high recording density per platter, more than one platter per HDD, higher rotational speeds up to 15000 RPM for enterprise class drives, and reduced costs due to economies of scale. However, they do have inherent disadvantages for the following reasons – further recording density increase has hit the limits of the physical space, increasing the rotational speed of the platter increases the cost exponentially, and being a mechanical device it is bound to physically fail due to all the moving parts. A single HDD with a single platter at 15000 RPM can at most deliver a transfer speed of 100MB/s for sequential block reads, and for the random reads for the same configuration, transfer speed drops down to as low as 10MB/s Given the inherent limitations of mechanical storage devices and the rapid drop in prices of non-volatile memory (NVM), NVM is the next revolution in storage. It is found in almost all mobile devices and now continues to replace mechanical devices across the board. There are several reasons for this – they are now cost competitive with HDDs per terabyte of storage capacity and this price parity will continue to erode in favor of NVM in the coming years; NVM technology is far more reliable in the longer term because it has no moving parts; NVM is over 100 times faster than HDD and has similar transfer speeds for both sequential and random reads/ writes unlike HDDs; and micro-second read/ write latency compared to milli-second latency for HDDs. Companies like Intel and Samsung have now developed NVM technologies that are 3 dimensional – it means increased storage density per cubic measure of volume without any performance degradation. The first system implementations of NVM were found to be SSDs that use the serial ATA protocol or SATA. The reason behind this is very simple. They achieve a 100-fold increase in transfer speeds relative to HDD immediately, without changing the upper level small computer systems interface (SCSI) protocol. The SCSI protocol is over 4 decades old and is used by all I/O protocols such as fiber channel etc. All major operating systems also support the SCSI protocol. So for the industry’s quick gain, it was easy to replace the HDD with an NVM based SSD. The next disruption was soon born because the SCSI protocol and its associated software stack were very heavy as far as execution time was concerned. The SCSI protocol overhead directly impacted latency of reads and writes which is detrimental to high performance applications such as high frequency trading, small transactions in banking, and numerous database applications for machine learning and artificial intelligence. Thus, an industry working group was formed to address the latency problem associated with the SCSI proto col. The industry came up with a new protocol which takes advantage of the native speed of NVM. They completely eliminated the SCSI protocol to define a new protocol called NVMe (Non-Volatile-Memory Express). In this protocol, the NVM device is directly attached to the I/O PCI express bus – and hence the extension ‘e’ in NVM. This eliminates the need to have the traditional hardware and firmware that resides in a host bus adapter (HBA) along with HBA itself. The following diagram illustrates this concept. Latest NVM highlights PCIe Gen1 is 2.5gbps per lane per direction. Today’s SSDs pack Gen3x2 or Gen3x4 (8Gbps x 2 or 4 lanes = upto 32Gbps) bandwidth in a very tiny M.2 gumstick form-factor. 3-D NAND and 3D-Xpoint NAND, DRAM-bandwidth at flash-economies, very low-latency flash (20us IO read/ write) latency compared to 200us latency for enterprise flash. New form-factor coming to pack TB of capacity – ‘ruler’ form factor from Intel. NVMe enables performance scaling with the increase in capacity – traditionally denser HDD did not bring any performance improvement. NVMe over TCP enables low-cost SAN deployment compared to Infiniband, RoCE, iWarp or FC. NVMe allows dual-ported drives providing high-availability (same PCIe connector for either gen3/ gen4x4 or 2 separate gen3/ gen4x2 links); and…

Read More