securitylinkindia

AMAG Expands Visitor Management Offering With New Symmetry™ GUEST Kiosks

AMAG Technology introduces its Symmetry™ GUEST visitor management family of interactive touch screen kiosks. Symmetry GUEST improves the visitor experience by automating all processes associated with the lifecycle of a visitor, streamlining the journey through the reception area, enforcing compliance and reducing operating costs. It eliminates paper logbooks and creates an audit trail to properly manage visitors. Kiosk setup is fast and easy as the software and hardware come pre-installed. “End users will find Symmetry GUEST kiosks improve visitor traffic flow and are a sleek and innovative addition to their lobbies, improving first impressions while mitigating risk,” said Jim Murray, Sr. Product Manager, AMAG Technology. The Symmetry GUEST kiosks come in three main designs – counter top, slim wall mount and free-standing – and two colors (white or black) with custom branding options to best meet the visitor check-in requirements and lobby décor. Countertop style kiosks provide options for either unfixed (portable) or fixed (secure) mounting to a receptionist desk or check-in counter for easy access. Slim wall mount kiosks mount flush to the wall or glass and are perfect for small lobbies or large such as busy areas where multiple units are needed to efficiently check-in a high volume of visitors. Free-standing kiosks come with or without cabinet and printer. Custom branding options are also available for all Symmetry GUEST kiosks enabling organizations to place their visitor check-in messaging and logo on the kiosk for increased visitor engagement.  

Read More

IPSecurityCenter™ Wins 2019 New Product of the Year Award

CNL Software IPSecurityCenter PSIM solution has won the Convergence & Integrated Software and Solutions award in the 2019 New Product of the Year Awards by Security Today. The New Product of the Year Award honors the outstanding product development achievements of security equipment manufacturers whose products are considered to be particularly noteworthy in their ability to improve security. Nearly 100 entries were received in the 11th successful year of the independently juried contest. “CNL Software is honored to have won this prestigious award as it recognizes our commitment to providing customers with highly integrated system solutions in converged security, life safety and facility management environments that achieve their operational goals and objectives. IPSecurityCenter’s convergence and integration capabilities maximize our customer’s investments, whilst increasing the efficiency of security operations. CNL Software is proud to play a critical role in facilitating public safety and the securing of our customer’s facilities, assets and infrastructure,” said Mike Mostow, General Manager – Americas at CNL Software.  

Read More

STM32Trust Ecosystem Consolidates Cyber-Protection Resources for IoT Designers

STMicroelectronics launched STM32Trust to guide designers’ efforts to build strong cyber-protection into new IoT devices leveraging industry best-practices. STM32Trust combines knowledge, design tools, and ready-to-use original ST software. These help designers take advantage of features built into STM32 micro-controllers to ensure trust among devices, prevent unauthorized access, and resist side-channel attacks. All this averts data theft and code modification. “Connected devices like smart sensors and remote actuators are intrinsic to our infrastructure and services, so ensuring effective security becomes of paramount importance,” explained Ricardo De Sa Earp, General Manager of STMicroelectronics’ Microcontroller Division, “STM32Trust eases developers’ understanding and acceptance of the new mandatory security rules, which is a key emerging challenge in the general-purpose micro-controller market today.” Integrating all available cyber-protection resources for the STM32 family, STM32Trust helps designers implement a robust multi-level strategy leveraging security-focused chip features and software packages. The STM32 family is the world’s leading system-on-chip portfolio based on the Arm® Cortex® CPU architecture and contains almost 1000 variants used in smart appliances, remote sensors, wearables, e-health devices, IoT gateways, access-controlled storage, payments, and many other connected devices. Depending on the model, hardware cyber-protection can include features such as customized secure boot, a random-number generator to prevent hackers observing patterns in signals, dedicated encryption co-processors, and secure storage for encryption keys. ST also builds in tamper detection, firewall code-isolation mechanisms and implements Arm TrustZone® technologies for extra protection of the most sensitive code. STM32Trust provides product developers with all they need to protect connected objects effectively using these features including reference material and free software.  

Read More

Dallmeier Introduces Single Sensor Cameras

The Dallmeier 5000 series single sensor cameras are equipped with a new encoder technology. The new versions of the dome, IR and fisheye cameras support H.265 HEVC (High Efficiency Video Coding) and offer improved object classification with camera-based, AI-enhanced VCA. By its nature, the constantly improving resolution of video images demands high bandwidths and large amounts of memory. With the new generation H.265 encoder in the Dallmeier cameras, data rate can be reduced by up to 50% compared with an H.264 stream without sacrificing resolution or image quality. When used in conjunction with the lat est Dallmeier recording systems, a significant reduction in network and memory capacity can be achieved. Another advantage of the new 5000 series cameras is the new generation of video content analysis (VCA). Neural networks are implemented in the camera, supporting the classic VCA and thus enabling significantly more efficient object classification in the camera itself. After a short learning phase, the system is capable of delivering still more precisely defined analysis of the recordings and more effective use of automatic video analysis functions such as lossless and multiple auto tracking.  

Read More

Genetec Recognized as one of the Fastest Growing Access Control Software Manufacturers in the World

According to a recent report published by business intelligence provider IHS Markit, Genetec Inc. a leading technology provider of unified security, public safety, operations and business intelligence solutions, has become one of the fastest growing providers of access control software in the world. The IHS report showed Genetec rising to the number 3 position in the Americas region (with a 45% growth in business in the region), and to the number 6 position globally in 2018. According to the report Access Control Intelligence Service Annual Update for Global and Regional Databases 2019, “The advanced analytical capabilities of Genetec Security Center software have led Genetec to take market share from competitors, and several traditional access control equipment manufacturers have partnered with Genetec to take advantage of their superior software capabilities. As a result, the Genetec software business grew nearly 45% in the Americas in 2018 to reach a 7.8% market share in the region.” “Broad adoption of Genetec Synergis™ demonstrates that our focus on offering a unified enterprise-class access control platform is putting us in a strong, leadership position. Genetec is capturing market share based on innovative technology and this is resulting in strong organic growth of our access control business worldwide,” said Thibaut Louvet, Product Group Director, Access Control. According to IHS Markit (2017 video surveillance market share database, 2017 access control intelligence database, and 2018 ANPR & detection sensors report), Genetec is the only security and public safety solutions developer to hold top-10 global rankings across all physical security industry sectors including video management software (VMS), access control software, and automatic license plate recognition (ALPR) software.    

Read More

Climax Introduces KPT-39 Remote Keypad Series with Proximity Reader

KPT-39 is a smart wireless remote keypad, offering users an easy-to-program solution to easily arm, disarm, and home arm their security system. For enhanced flexibility and convenience, KPT-39 series can integrate with RFID key fobs or NFC tags for secure quick access without entering pin codes manually. To provide additional peace of mind and safety, KPT-39 series features dual key function that can activate panic, fire, or medical emergency alarm at the touch of a button. KPT-39 keypad can be wall-mounted at any location that is the most convenient and the most accessible in users’ homes. KPT-39 is safeguarded by tamper protection. KPT-39 leverages Climax’s industry-leading RF technology to accelerate the speed of signal transmission and deliver reliable and extensive communication range. KPT-39 also features a power conservation function that consumes power only when in operation. Features Enables user to arm/ disarm/ home arm the security system by simply swiping RFID key fobs or NFC tags. Integrates up to 100 RFID key fobs or NFC tags. Dual key buttons to trigger panic, fire, or medical emergency alarms. Stand-by mode for power saving function. LED status indicators. A 15-button backlit keypad for easy nighttime visibility. Tamper protection against unauthorized removal. Extensive RF communication range and faster signal transmission. Regular supervision signals to check system integrity. IP34 waterproof standard.  

Read More

Creating Jobs, Securing New India

The Federation of Indian Chambers of Commerce and Industry (FICCI) organized the seventh edition of Private Security Industry Conclave (PSIC) 2019 on 30 August 2019 at Federation House, New Delhi with the theme – ‘Creating Jobs – Securing New India.’ The conclave was aimed to highlight the potential of private security industry to contribute to the vision ‘new India’ through its increasing role in homeland security and employment generation. The event brought together experts from varied sections including the government, private security industry, state controlling authorities, service users and other stakeholders. The Conclave was inaugurated by Piyush Goyal, Minister of Commerce & Industry, as well as Railways, Government of India. Recognising the significance of the private security industry in terms of job creation and national security, Mr Goyal suggested that the government will try resolving the GST issues and ask bankers to help. “If the industry comes into the ambit of regulation, the government will look into the GST problem where customers delay the payments, but the GST has to be paid on the due date,” he said, “Two things can be done. We can try ensuring timely payments from all government organizations, and banks can be asked to devise a product dedicated to the private security industry where over-dues for a regulated entity from a creditworthy client can be securitized.” “Delay in granting licenses is a serious issue. I would urge the industry to come up with a framework for the online registration process and minimum documentation, which the Home Ministry can notify to ensure time-bound manner registration is granted. The framework will take care of the interest of workers in the industry “ Piyush Goyal Minister of Commerce & Industry, as well as Railways, Government of India Mr Goyal urged the industry to recommend licencing framework guidelines to avoid delays in the registration of private security agencies. The government is willing to act as a facilitator in setting up an organized framework for the private security industry including matters relating to licensing, registration and training. The Railway Minister also asked the industry to impart better training to the security guards and possibly design certification in consultation with the Home Ministry for increasing the avenues for promotion and better income of the guards. As for multiple regulators in the states, the industry can flag the problems and the government would try dovetailing all the regulations into a uniform framework. The minister further said that the problems in the industry have to be sorted out mutually and he would look into the possibility of engaging private security guards in the government, particularly in the railways, and in less critical areas. The sector can be one of the largest employment generators and the current workforce of 70 lakh can grow to two crores. “The industry is a bridge between unemployed youth and the organised sector. Even amidst the current slowdown, the private security industry continues to grow and create jobs. The given assurances from the senior ministers to resolve issues related with the GST, Code on Wages, Credit Access for smaller companies and enabling rather than enforcing compliance to labour reforms is very reassuring” Rituraj Sinha Chair, FICCI Committee on PSI The PSIC 2019 was also graced by Santosh Kumar Gangwar, Minister of State (Independent Charge) for Labour and Employment, Government of India who in the next session suggested that the private security industry plays a major role in creating jobs in the country and the guards who put in a lot of hard works deserve a decent and timely wage to sustain themselves. The government will ensure a fair wage for all private security workers by bringing it under the purview of National Minimum Floor Wage. “Since 2014, the government has been working to reclassify all old labour laws in four labour codes, and the Parliament has passed the Code on Wages in August. The passage of this code entitles minimum and timely wage to all 50 crore security workers “ Santosh Kumar Gangwar Minister of State (Independent Charge) for Labour and Employment, Government of India On the disparity in minimum wages in different states ranging from Rs.5,000 to Rs.13,000 per month, the minister informed that there has been a provision of National Minimum Floor Wage in the Code of Wage which will decide the minimum wage for all the states. Besides, he appealed all the states to follow suits towards classification of security guards as skilled labour is already done in 2017. “The Code on Wages is a historic bill which will ensure statutory protection for minimum wages and timely payment of wages to approximately 50 crore workers of organized as well as unorganized sector. We welcome the Government’s initiative to have brought massive labour reforms in the past couple of years, along with the Code on Wages and the proposed future changes. It will eventually aid in creating lakhs of jobs. We also appreciate the intent of the government to execute these massive changes, through use of digital solutions and change the role of authorities from only inspection to facilitation also. We expect it will prove to be a milestone as it will promote respectful life to every worker of the country and tremendously help companies and entrepreneurs in ease of doing business” Rajeev Sharma MD – G4S India Earlier, Sandip Somany, President, FICCI said that the private security industry is a sunrise sector with a potential to be the second-largest employment generator in India. It employs workers from a rural and poor background. The government and industry could focus on the cost of doing business, regulatory reforms, labour reforms and sector-specific special packages, and blending of manpower with technology for providing better services. He also emphasized on the proper enforcement of the Private Security Agencies (Regulation) Act, besides curbing delays in granting licences, streamlining of different regulatory conditions in states along with the PPP approach where the industry would engage with law enforcement agencies. Manjari Jaruhar, Advisor, FICCI Committee on Private Security Industry suggested that the…

Read More

Delta TB150 Crash Rated Portable Bollard Stops 15,000 Pound (6,804kg) Vehicle Going 50mph (80.4kph)

Delta Scientific’s new patented crash rated TB150 portable bollard system lets law enforcement and other security providers promptly block access to temporary venues where vehicles can be used as weapons against large numbers of pedestrians. Individual portable bollards provide vehicle barricades in applications such as heavily traveled walkways and roadways, or any area that a vehicle can get through. They can also be used as substitutes until permanent bollard systems get installed. Ten TB150 portable bollards can be linked together with a cable system and placed on a road’s surface to create immediate protection for a span of 40 feet (12.2m). No other installation procedures, excavations or sub-surface preparations are required. Certified testing demonstrates that a TB150 portable bollard will stop and disable a 15,000 pound (6,804kg) vehicle traveling at 50mph (80.4kph), resulting in an ASTM M50, P3 rating. “Being able to stop a massive, high-speed attack vehicle is imperative to protecting crowds enjoying venues such as malls, theme parks, and public fairs,” emphasized David Dickinson, President of Delta Scientific, “The TB150 marks a new standard in crowd protection containing and stopping 1.2 million foot-pounds of attacking truck. The portable bollard array requires no foundation or site preparation and can be used for permanent or temporary vehicle control. The bollards can be set up on any stable surface such as concrete, asphalt, compacted soil or vegetation.” According to Dickinson, the TB150 temporary bollards can be used to close off streets, entrances, or wide expanses such as access to pedestrian areas or even airport runways. They can be installed in conjunction with Delta’s popular MP5000 portable barricade to fill in any gaps to protect people and critical infrastructures at public events such as parades, festivals, sporting weekends and any place that vehicles could attack transitory events. The combination of the portable barriers with the new portable bollards provides fast controlled vehicle access without the time and labor of installation. “From a purchasing standpoint, it can be easier to buy portable bollards and barricades than permanent solutions,” added Dickinson, “The latter are oftentimes placed into an organization’s real assets budget because they are permanently installed into the ground, becoming part of the property. Such budgets can often create complex purchasing scenarios for law enforcement or public safety departments. However, purchasing portable bollards and barricades is no different than buying protective vests for personnel or new sets of wrenches for the maintenance department.”  

Read More

Eagle Eye Networks Enhanced Eagle Eye Cloud VMS

Eagle Eye Networks unveiled enhancements to the Eagle Eye Cloud VMS supporting 15 additional third party mobile and body worn cameras. The Eagle Eye VMS provides simultaneous operations, search, and cloud storage for fixed and mobile cameras. Managing and retrieving body worn camera video have historically been a separate process from the primary video surveillance system. With Eagle Eye, this can now be an integrated and cohesive process that requires less training, and is more secure and reliable. The Eagle Eye mobile and body worn camera system includes: Viewing mobile and fixed camera footage in one cohesive interface eliminating the need for multiple applications. Archiving, storage and retrieval of time-stamped mobile footage with GPS coordinates and tracking. ● Secure sharing of video via mp4 files or via direct links to interested parties. Open platform that provides compatibility with a broad array of cameras. Today, Eagle Eye Networks provides support for over 3,500 mobile and fixed cameras. Access to a true cloud system meaning virtually unlimited scalability, triple redundant data center architecture, full encrypted video, and comprehensive cyber security. Eagle Eye Video API Platform delivers unlimited video analytics from partners. With video stored in the cloud and open API’s, new AI analysis is being continually developed and improved. “It’s been proven repeatedly that open systems architectures win over proprietary systems. Eagle Eye Networks believes in open architecture standards and our platform, Eagle Eye Cloud VMS, demonstrates this. Extending our platform to encompass mobile cameras is a logical extension of our open camera platform. Our open platform ability to integrate third party AI and analytics is delivering on a broad set of applications for our customers,” said Dean Drako, CEO of Eagle Eye Networks. Eagle Eye Networks customers have desired integration of mobile and fixed camera surveillance to reduce risk in commercial industries – in-home services, retail, guarding, commercial delivery services, real estate sales, and other service-oriented verticals. The mobile camera video and GPS data will be securely transferred to the Eagle Eye cloud data center where video footage can be reviewed, analyzed and stored.  

Read More

How can SMBs Protect Their Data in the Cloud?

More and more small to medium sized businesses (SMBs) are using cloud storage. This is due to the huge benefits the cloud brings in terms of productivity and flexibility. However, most SMBs seem to still be suspicious about it. Actually, recent research shows that 61% are convinced that their data is unsafe in the cloud. Why, and what can be done about it? SMBs are worried about their data in the cloud SMBs are afraid to lose visibility and control over their data once they hand it over to a third-party cloud platform. Their first worry is that it’s harder to detect unauthorized access when data can be accessed from anywhere in the world and on any device. On the contrary, when data is stored on-premise, you need to be physically present in the office to access these files. So it creates a natural barrier against unauthorized access from outside the organization. Furthermore, access can be restricted to specific devices only. SMBs also worry about the fact that it’s harder to stop or prevent data theft from the leaving employees. For the same reasons, it is easier to spot an employee stealing data when it’s stored on the physical desktop computer. With cloud storage, it becomes pretty easy for leaving employees to steal information before they go. Finally, hybrid storage environment can be complex. Using a mixture of on-premise and cloud storage increases productivity. Though, managing the security of the data stored across multiple environments becomes very challenging. The attitude regarding cloud storage is not helping According to the same research, a lot of organizations believe their own data is more valuable than that of their clients. This is pretty disturbing to know that third-party and insider breaches are on the rise. Those who operate with large and complex supply chains will be concerned by this mentality given the lack of visibility and control over data security once it lives on third-party systems. Furthermore, as we said previously, organizations using a mixture of on-premises and cloud storage systems are having troubles managing the security of data – either their clients’ or their own.  Besides, almost half of SMBs are convinced that moving to the cloud has harmed their security and 59% assume that the native security of their cloud storage provider is not strong enough to protect their data. Knowing that, it is pretty worrying to see that 80% are only relying on the native security of the cloud storage provider they’re using and only 1 out of 10 organizations is using a third-party cloud file monitoring tool to prevent unauthorised access to sensitive data. SMBs clearly need a more efficient way to ensure their data in the cloud remains safe. Moving your data to the cloud does not reduce an organisation’s need to secure access to and usage of file data. SMBs’ solution to protect their data in the cloud The attitude regarding cloud storage needs to change. Nowadays, a majority of organisations share a big amount of valuable data with their clients over email or in the cloud. Knowing that supply chains attacks are on the rise, it only takes one mistake from one supplier to have your data compromised. Furthermore, most organisations today look into the cybersecurity of their partners before choosing to work with them. It is therefore of great importance that organisations can show that they can keep their clients’ data safe. To be able to protect your data both on-premise and in the cloud, you need to proactively track and audit on all access to files and folders. You need a solution in place that can provide a single consistent view of the security of your files and folders across all your storage servers – whether on-premises or on a third-party cloud system. It needs to be able to report and alert you in real-time to suspicious file activity the moment it occurs. That way, you are sure that if someone other than an authorized employee tries to access your data, you’ll be the first to know about it and therefore you can react quickly before any damage is done. By-  François Amigorena – Founder and CEO     

Read More