securitylinkindia

Is the Public Cloud Secure?

While deciding amongst a public, private or hybrid cloud offerings, any organization considers the involved security risks as one of the most important parameters. The prefix ‘Public’ alone can make some people think that public cloud is not as secure as a hybrid, or a private offering. But is that really true – or is the public cloud secure enough for your organization’s data? Let’s try to analyze this question and arrive at an answer post validation of some facts. However, before we do the analysis let’s give a brief intro to the public cloud so that this assessment becomes meaningful even for someone with no technical background on cloud computing. Introduction to public cloud The concept of offering cloud computing as a public utility is not new. It was first mooted in the 1960s by JCR Licklider as an ‘intergalactic computer network,’ which laid the foundations of grid computing, an early forerunner of the cloud. However, it was wasn’t until the 1990s when the internet started to offer significant bandwidth that the idea actually started seeing the light of the day. One of the first milestones was the arrival of salesforce.com in 1999 which pioneered the concept of delivering enterprise applications via a simple website. In 2002, Amazon created a suite of cloud based infra services including storage and compute as a captive arm of Amazon e-commerce. Later by 2006 Amazon Web Services (AWS) was introduced as a commercial web service, with the launch of their compute service Elastic Compute (EC2) that allowed small companies to rent computers on the cloud to run their own applications. Soon enough other players entered the market as public cloud service providers prominent being IBM Cloud (2011), Google Cloud (2011), Microsoft Azure (2012), and many others. Public cloud computing is defined as computing services offered by third party providers over the public internet making them available to anyone who wants to use them. A public cloud is built on a fully virtualized environment which supports a multi-tenant architecture enabling users to share computing resources – thus bringing economies of scale and lowering costs. A user pays only for what they use just like a public utility service such as electricity or piped gas. This no capex opex only model was the major attraction which initially attracted a lot of customers to the public cloud. Over the years as the technology has evolved, most public cloud service providers have upped their game This no capex opex only model was the major attraction which initially attracted a lot of customers to the public cloud. Over the years as the technology has evolved, most public cloud service providers have upped their game. Is that a valid concern, or just a bogey? This article tries to address the query. Security concerns in the public cloud Loss of governance The idea of migrating applications hosted on premise to the public cloud is quite disconcerting to many users. The concerns largely are around the under mentioned areas. Data loss/ leakage. Misuse or leakage of data especially with other tenants in the cloud. Access control. When a business operates in an exclusively on-premise IT infrastructure, governance is controlled and executed within a ring-fenced environment. In the cloud, the boundaries are suddenly gone and this instils a sense of unease. The customers are not sure of if unauthorised access is prevented, or even if the cloud providers claim so how can they be assured of it. Incident response. How is this going to be managed? DDoS protection. What is the protection from a distributed-denial-of-service attack? Compliance Data sovereignty. In many cases regulation demands that the data stay within a country or a region. How can a customer be assured of the same when the cloud service provider host their infra in their global data centers. Compliance to certifications/ audits. Many organizations may be holding security related or other global certifications e.g., ISO 27001 etc., but how can they be assured in the public cloud? Privacy Misuse of data. There are concerns about the customer data being used by the cloud service providers analytics, marketing, and/ or shared with any 3rd parties? Data ownership. Who owns the data on the cloud? Malicious insider. A malicious insider is an employee of the cloud service provider who abuses his or her position for information gain or for other nefarious purposes such as a disgruntled employee. How does one prevent that? Transparency Visibility. Do I have control over my data, where is it stored? Who can access it in the cloud provider team? Deletion. When I delete my data in the cloud, is it truly and completely deleted? How cloud providers have responded to the security concerns Institutional frameworks The Cloud Security Alliance (CSA) was formed in Dec 2008 with the aim to securing cloud computing. It is a not-for-profit organization with a ‘mission to promote use of best practices for providing security assurance for cloud computing.’ Over the years it has come up with several security guidelines and standards to assure public cloud security, prominent amongst them is the 2010 Cloud Controls Matrix (CCM) which is a baseline set of security controls to help enterprises assess the risk associated with a cloud computing provider. It provides guidance in 16 security domains including application security, identity and access management, mobile security, encryption and key management, and data center operations. In 2013, it launched the STAR (Security Trust and Assurance Registry) certification. STAR has 3 levels of certifications. It encompasses key principles of transparency, rigorous auditing and harmonization of standards. STAR level 2 certification provides multiple benefits including indications of best practices and validation of security posture in the cloud offerings. All major cloud providers conform to these standards and that has greatly helped them build assurance in the minds of the customers. Shared responsibility model of security Security and compliance is a shared responsibility between the cloud provider and the customer. This shared model can help relieve the customer’s operational burden as the cloud…

Read More

Corporate Security in the Age of IoT

Internet has undoubtedly been one of the most significant developments in humanity’s technological journey since the industrial revolution. Rapid advances in telecommunication, especially wireless coupled with software application development, has led to the proliferation of internet to almost all facets of human activity. The ‘Internet of Things’ or ‘IoT’ amalgamates the strengths of network, wireless, miniaturised hardware, software, and cloud to create an even greater medium that pushes the frontiers of day-to-day usage of technology in a multitude of facets of human life. Simply put, the IoT is a computing concept of physical objects being connected to the internet, being able to identify themselves to other devices, and being able to intelligently exchange data through a variety of media. IoT thus creates an ecosystem wherein just about anything, and not just present-day devices such as laptops, smart phones, tablets, wearable digital devices etc., can be connected and can communicate in an intelligent manner. The result thus is a physical world transforming into a gigantic digital information system with application in manufacturing, R&D, smart cities, smart homes, smart campuses, critical infrastructure, transportation, computing, agriculture, defence, security & surveillance, or in any other sector. This has led to the emergence of new applications and business models. However, the IoT, like all digital technologies that make it up, is fraught with vulnerabilities and potential risks. Growth of IoT We see connected devices increasing in our life day by day. By qualified estimates, at present (2019) there are approximately 7 billion inter-connected devices. This number is expected to increase to about 29 billion by 2022, of which approximately 18 billion will be related to IoT. Between 2016 and 2022, IoT devices are appreciated to increase at a CAGR of 21 percent, driven by new use cases, miniaturization of hardware, increase in computing power, ICT (4G/ 5G), lowering data cost, low energy consumption etc. It is expected to be 50 billion connected devices by 2025 with a total of 100 billion connections in public utilities, transportation, manufacturing, healthcare, finance, agriculture, personal and domestic devices, and in other industries. Corporate security has been one of the early adopters of IoT. Corporate security in the age of IoT The greatest challenge to corporate security during the past decade has been cybercrime – primarily distributed-denial-of-service (DDoS), malware, ransomware and data breach/ theft. Ransomware damage costs exceeded $5 billion in 2017 alone, 15 times the cost in 2015. It has been qualified that cybercrime costed the world $3 trillion in 2015, and that this figure would increase to $6 trillion annually by 2021 with a major attack vector being targeting to IoT. Gartner has predicted that by 2020, approximately 25% of all attacks on enterprises will target IoT. Accordingly, global spending on cybersecurity products and services are predicted to exceed $1 trillion cumulatively over 2017 to 2021, with a 12-15 percent year-over-year cybersecurity market growth through 2021. This may, however, not suffice to protect the new way of life through IoT. Mitigating vulnerabilities of IoT A typical IoT architecture is depicted below. It is easy to infer that each stage or layer of the architecture can be exploited by nefarious-intentioned attackers. Vulnerabilities could cause, for example, an attacker taking control of a visitor management system, or disrupting a supply chain, locking down a manufacturing facility, or shutting down a critical utility of a city or campus, or even scarier scenarios. Mitigating the principal technical vulnerabilities would entail the following: Strengthen the network: Protection and security of the network connecting IoT devices to back-end systems on the internet is critical. However, IoT network security is more challenging than traditional network security as there is a wider range of communication protocols, standards and device capabilities – all of which pose significant issues and increased complexity. Key capabilities would include traditional endpoint security features such as anti-virus, anti-malware, firewalls, and intrusion prevention and detection systems. IoT device authentication: Unlike regular enterprise networks where the authentication process involves a human entering an access credential, most IoT authentication scenarios (such as embedded sensors) are machine-to-machine based, without any human intervention. Therefore, designers/ users must have the ability to authenticate an IoT device including managing multiple users of a single device (such as a connected car), ranging from simple static password/ Pins to multi-factor authentication, digital certificates, biometrics etc. Encryption key life-cycle management: Encrypting data at rest and in transit between IoT edge devices and back-end systems using standard cryptographic algorithms help maintain data integrity and prevent data sniffing by hackers. The wide range of IoT devices and hardware profiles limits standard encryption processes and protocols. Further, all IoT encryption must be accompanied by equivalent full encryption key lifecycle management processes, since poor key management will reduce overall security. Robust IoT PKI: The hardware specs for IoT devices manufactured by different OEMs may limit or prevent their ability to utilize public key infrastructure (PKI). Notwithstanding, digital certificate, and cryptographic key, and life-cycle capabilities including public/ private key generation, distribution, management and revocation are essential. Towards this, digital certificates could be securely loaded onto IoT devices at the time of manufacturing, and then activated/ enabled by third-party PKI software suites. Alternately, the certificates could be installed post manufacture. AI, ML in IoT: IoT security analytics will increasingly be required to detect IoT-specific attacks and intrusions that are not identified by traditional network security solutions such as firewalls. Here, machine learning, artificial intelligence and big data could provide predictive modelling and anomaly detection while collecting, aggregating, monitoring and normalizing data from IoT devices so as to provide actionable alerts on specific activities, or when activities fall outside established policies. API security: API security will be essential for protecting the integrity of data transiting between edge devices and back-end systems to ensure that only authorized devices, developers and apps are communicating with APIs, as well as for detecting potential threats and attacks against specific APIs. Looking ahead More devices are being IoT enabled – means more complex is the IoT ecosystem. Further, more data is being collected…

Read More

Detected Foreign Terrorist Fighters During Maritime Border Operation

A maritime border operation coordinated by INTERPOL has detected more than a dozen suspected foreign terrorist fighters (FTFs) travelling across the Mediterranean. Operation Neptune II (24 July – 8 September 2019) focused on the threats posed by suspected FTFs potentially using maritime routes between North Africa and Southern Europe during the busy summer tourist season. Supported by an INTERPOL team on the ground, the intelligence-led operation also targeted criminal networks involved in human trafficking, people smuggling, firearms trafficking and the drugs trade. Officials at seven seaports in the six participating countries – Algeria, France, Italy, Morocco, Spain and Tunisia – carried out more than 1.2 million searches across INTERPOL’s databases for stolen and lost travel documents, nominal data and stolen vehicles via its I-24/7 secure global police communications network. These resulted in 31 active investigative leads, with more than 12 of these linked to the movement of terror suspects. “When information is shared between regions via INTERPOL’s networks at the global level, every check, border control or random search is a potential break in a terror investigation,” said INTERPOL Secretary General Jürgen Stock. “This is how INTERPOL acts as a global tripwire by disrupting the movement of individuals linked to criminal and terrorist activities,” added the INTERPOL Chief. As recognized by UN Security Council Resolution 2178 (2014), sharing information through INTERPOL’s global systems is vital to better identify and prevent the travel of suspected foreign terrorist fighters. In this respect, INTERPOL’s databases currently hold details of more than 50,000 foreign terrorist fighters and some 400,000 pieces of terrorist-related information. The operation further highlighted the role of international, regional and national inter-agency cooperation in enhancing security, with experts from the European Border and Coast Guard Agency (Frontex) and the World Customs Organization (WCO) also participating in the initiative.  

Read More

Identiv Strengthens Medical Device Authentication and Anti-Counterfeiting in the IoT

Identiv, Inc. and Schreiner Group GmbH & Co. KG have recently entered into a multi-year agreement for the delivery of Identiv’s RFID Inlays for device-level authentication and anti-counterfeiting of one-time-use medical devices in hospitals. Currently contracted to strengthen secure authentication in the Internet of Things (IoT) over the next three years, several million inlays from Identiv’s radio-frequency identification (RFID) portfolio will be connected to high-tech labels and attached to one-time-use medical devices in hospitals throughout Europe. Identiv’s RFID Inlays will provide contactless identification of the devices, optimizing processes during medical procedures (i.e., checking for compatibility between different types of equipment) and protecting patients’ health and safety from counterfeiting. “Identiv is proud that our highly secure RFID Inlays were the right fit for this project, strengthening our long-term partnership with Schreiner Group,” said Dr. Manfred Mueller, Identiv COO and GenIdentiv Strengthens Medical Device Authentication and Anti-Counterfeiting in the IoT With Multi-Year Project Awarded by Schreiner Group for Secure RFID Inlays eral Manager Identity, “We see device-level authentication and anti-counterfeiting applications gaining further importance throughout the IoT, not just in the medical field. Customers looking to protect people and products are our priority at Identiv.” Meeting the highest industry standards in the challenging healthcare market, Identiv’s dry 32×15 mm RFID Inlays feature Infineon SRF55V02P chips, aiming to provide the best possible treatment for patients. Once the three-year contract is fulfilled, there will be discussion to expand the business. “At Schreiner Group, it’s our mission to benefit our customers by delivering intelligent solutions that optimize processes and enhance product safety,” said Manfred Laschinger, Schreiner Group GmbH Head of Corporate Purchasing, “Our customers are challenging us to meet the highest standards in terms of quality, reliability and service, and we are pleased to continue working with Identiv to deliver just this.” Identiv’s comprehensive RFID, NFC and inlay transponder portfolio brings smart identities and security to the IoT. Identiv’s innovative high-frequency (HF) and ultra-high frequency (UHF) 13.56 MHz RFID Inlays are completely customizable, are available as dry or wet, and come in various shapes and sizes. The inlays can feature multiple designs integrating various materials, chip technologies, and frequencies for metal and non-metal environments. Identiv produces inlays using advanced flip-chip technology and state-of-the-art high-volume die-bonding processes with integrated in line quality and process control to guarantee superior quality performance. In addition to healthcare and the IoT, Identiv’s RFID Inlay portfolio can benefit near field communication (NFC) smart posters and billboards, libraries, event and transportation ticketing, automotive and chemical industries, logistics and supply chain, asset management, pharmaceuticals, electronic games, event management, wearable technology, customer loyalty programs, and more.  

Read More

Enterprises are Leaving IoT Devices Vulnerable to Cybersecurity Threats

IoT is one of the fastest growing trends in technology today, yet enterprises are leaving themselves vulnerable to dangerous cyberattacks by failing to prioritize PKI security, according to a new research from nCipher Security, an Entrust Datacard company. The 2019 Global PKI and IoT Trends Study, conducted by the Ponemon Institute and sponsored by nCipher Security, is based on the feedback from more than 1,800 IT security practitioners in 14 countries/ regions. The study found that IoT is the fastest-growing trend driving public key infrastructure (PKI) application deployment – with 20% growth over the past five years. Respondents cited concerns about several IoT security threats including altering the function of IoT devices through malware or other attacks (68%), and remote control of a device by an unauthorized user (54%). However, respondents rated delivering patches and updates to IoT devices, the capability that protects against that top threat, last on a list of the five most important IoT security capabilities. The study also found that in the next two years an average of 42% of IoT devices will rely primarily on digital certificates for identification and authentication. But encryption for IoT devices, and for IoT platforms and IoT data repositories, is at just 28% and 25% respectively, according to nCipher’s 2019 Global Encryption Trends Study. “The scale of IoT vulnerability is staggering – IDC recently forecasted that there will be 41.6B connected IoT devices by 2025, generating 79.4 zettabytes of data,” said John Grimm, Senior Director of Strategy and Business Development at nCipher Security, “There is no point in collecting and analyzing IoT-generated data, and making business decisions based upon it, if we cannot trust the security of devices or their data. Building trust starts with prioritizing security practices that counter the top IoT threats, and ensuring authenticity and integrity throughout the IoT ecosystem.” PKI plays a strategic role, but organizations are leaving themselves vulnerable and unprepared PKI is at the core of the IT infrastructure for many organizations, enabling security for critical digital initiatives such as cloud, mobile device deployment, and IoT. Most respondents use PKI extensively in their organizations for SSL/TLS certificates (79%), private networks and VPNs (69%), and public cloud-based applications and services (55%). Yet more than half (56%) believe PKI is incapable of supporting new applications. In addition, many respondents see significant technical and organizational barriers to PKI usage including an inability to change legacy applications (46%), insufficient skills (45%), and resources (38%). Enterprise PKI security best practices a mixed bag Nearly a third (30%) of organizations – an especially jarring share considering the implications – are not using any certificate revocation techniques. More than two-thirds (68%) cite ‘no clear ownership’ as their top PKI challenge. But, some enterprises are applying more rigor to PKI security in certain areas. The share of respondents using ‘password only’ for certificate authority administrators has dropped 6% from 2018 to 24% this year, and 42% of respondents said that they are using hardware security modules (HSMs) to manage private keys. Other key findings from the report: HSM use as an IoT root of trust jumped significantly over 2018 (from 10% to 22%). Despite a growing number of options for PKI deployment (cloud, managed and hosted), internal corporate certificate authorities (CAs) remain the most popular and have grown 19% over the past five years to 63% – with 80% of financial services organizations favoring this option. Forty-four percent of respondents believe PKI deployments for IoT devices will consist of a combination of cloud-based and enterprise-based implementations. The most important PKI capabilities for IoT in 2019 are scalability to millions of certificates (46%) and online certificate revocation (37%). “PKI use is evolving as organizations address digital transformation across their enterprises. In addition to IoT, more than 40% of our respondents also cited cloud and mobile initiatives as driving PKI use,” said Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, “Clearly, the rapid growth of the IoT is having a huge impact on the use of PKI, as organizations realize that PKI provides core authentication technology for connected devices. For organizations to gain full advantage of their digital initiatives, they must continue to improve the security maturity of their PKIs.”  

Read More

Halma Reveals New Brand with a Redesigned Global Website

Halma plc, a global group of life-saving technology companies, has recently launched its new corporate brand, redesigned logo and global website. “Halma’s purpose and growth strategy are dependent on us partnering with others who want to solve the same problems that we do, whether that’s researchers, charities, talent, investors or corporates. Our new brand is designed to help us achieve this, and we hope it will act as a beacon for other innovative, purpose-led organisations and people who’d like to help us in growing a safer, cleaner, healthier future for everyone, every day,” said Jennifer Ward, Halma’s Group Talent and Communications Director. Halma partnered with design consultancy, Pentagram, to create a modern brand that reflects Halma’s purpose. The FTSE 100 global group also worked with digital communications agency, Investis Digital, to deliver a website that celebrates the unique combination of purpose, strategy, culture and a business model that differentiates Halma from its peers. The new website provides a platform to showcase Halma’s over 40 companies and their impact on the world.  

Read More

Key Industry Players Establish FiRa Consortium

(ASSA ABLOY Group, HID, NXP, Samsung, Bosch, Sony, LitePoint & TTA) Recognizing the need for emerging applications to build on a strong foundation that supports interoperability among all categories of devices, four sponsor members – The ASSA ABLOY Group which includes HID Global, and NXP Semiconductors, Samsung Electronics, Bosch – have recently launched the FiRa Consortium, which ensures an interoperable UWB ecosystem across chipset, device and service infrastructure through standards and certifications. The new coalition is designed to grow the Ultra-Wideband (UWB) ecosystem so new use cases for fine ranging capabilities can thrive, ultimately setting a new standard in seamless user experiences. Sony Imaging Products & Solutions Inc., LitePoint and the Telecommunications Technology Association (TTA) are the first companies to join this newly formed organization. The FiRa name, which stands for ‘fine ranging,’ highlights UWB technology’s unique ability to deliver unprecedented accuracy when measuring the distance or determining the relative position of a target. Especially in challenging environments, UWB technology outperforms other technologies in terms of accuracy, power consumption, robustness in RF connection and security by a wide margin. “As an industry consortium, we believe UWB technology can transform the way people experience connectivity, and we’re committed to the widespread adoption of interoperable UWB technologies,” says Charlie Zhang, Chair of the FiRa Consortium and VP Engineering, Samsung Electronics. The starting point for UWB technology is the IEEE standard 802.15.4/ 4z, which defines the essential characteristics for low-data-rate wireless connectivity and enhanced ranging. It is the aim of the FiRa Consortium to build on what the IEEE has already established, by developing an interoperability standard based on the IEEE’s profiled features defining mechanisms that are out of scope of the IEEE standard, and pursuing activities that support rapid development of specific use cases. The unique capabilities of UWB promise to make it an essential technology in many areas including: Seamless access control – UWB can identify an individual’s approach toward or away from a secured entrance, verify security credentials, and let the authorized individual pass through the entrance without physically presenting the credential. Location-based services – UWB offers highly precise positioning, even in congested multipath signal environments, making it easier to navigate large venues such as airports and shopping malls or find a car in a multi-story parking garage. It also enables targeted digital marketing campaigns and foot traffic data. Retailers can present customized offers, government agencies can tailor their notifications, and entertainment venues can personalize recommendations during events. Device-to-device (peer-to-peer) services – By providing precise relative distance and direction between two devices, UWB lets devices find the relative location of each other even without infrastructures such as anchors or access points. This allows people to easily find one another in crowded spaces or find items even when placed in hidden areas. Due to its low power spectral density, UWB offers little to no interference with other wireless standards, so it is well suited for use with other wireless technologies including near field communication (NFC), bluetooth and Wi-Fi. There are also adjacent markets that leverage UWB in other ways, especially automotive. “The FiRa Consortium’s commitment to a complete ecosystem means we will work with other consortia and industry players to develop approaches and define parameters,” said Charles Dachs, Vice-Chair of the FiRa Consortium and GM & VP, Secure Embedded Transactions, NXP Semiconductors. FiRa Consortium members will have the chance to influence industry trends, gain early access to technical details, certify interoperable products, expand the UWB ecosystem, and share expertise. Ramesh Songukrishnasamy, Director and Treasurer of the FiRa Consortium, and SVP & CTO of HID Global said, “We encourage anyone, from any relevant industry area, who has a vested interest in the success of UWB to join us and contribute to the Consortium’s work.”   

Read More

Padlock ABUS Touch

The first ABUS padlock which opens by fingerprint! The ABUS Touch is the first padlock from security specialist ABUS that can be unlocked using an individual fingerprint instead of a key. The battery-operated lock has a hardened steel shackle and is equipped with a 360° sensor that can recognize up to 10 different fingerprints. The padlock offers a wide range of applications for families, sport clubs and small businesses. Whether a locker in the fitness studio, a school locker or material box in the workshop there are many places where a padlock is an ideal solution. Instead of using a normal key, the ABUS Touch is opened with a unique ‘key replacement,’ the biometric fingerprint. If the lock detects a previously stored fingerprint, it unlocks fully automatically in less than half a second. Up to 10 different fingerprints can be stored so that other family members, friends or colleagues can also access the lock. The fingerprints can also be deleted and replaced by new fingerprints at any time. This is a clear advantage compared using keys, which have to be collected in this case. The forgotten or lost key is also a thing of the past with this lock. Lock informs about current status by LED To make it easier to enroll fingerprints in or out of the lock, the sensor is surrounded by an LED that guides the user through the process using different colours. This LED also indicates low battery status. If one fails to change the batteries in time despite the message – no problem – even if the batteries are completely empty, the fingerprints remain stored and are still recognized after the new batteries have been inserted.  

Read More

Allied Vision Out Now: First Alvium Camera Series Models from Allied Vision

Allied Vision has started the camera series with the release of three 1500 series models with a MIPI CSI-2 interface and one 1800 series model with USB3 vision interface. Unique ASIC for industrial embedded vision: The Alvium camera series is an innovative camera platform that combines the advantages of embedded sensor modules with the performance of industrial cameras for image processing – extensive functions for image correction and optimization, a large selection of state-of-the-art sensors, intelligent energy management, and a cost-optimized and compact design. The camera series is based on ALVIUM® technology, an application-specific integrated circuit (ASIC) with integrated image signal processor (ISP) and image processing library (IPL). The Alvium 1500 series: Embedded vision made easy: The Alvium 1500 series is the perfect camera for easy hardware and software integration in embedded applications. All models are equipped with a MIPI CSI-2 interface, which is particularly suitable for embedded vision applications as it can address the dedicated hardware of the embedded boards. The Alvium 1500 series offers a basic feature set. Software integration can be done via Video4Linux2 (V4L2) to GStreamer and OpenCV, or direct register access. Open source drivers for selected processor architectures are provided for V4L2 sup port, enabling easy integration and fast go-to-market on the customer side. This drastically reduces development time for customers. The image pre-processing functionalities can be configured directly on the ISP in the camera. The Alvium 1800 series: The best of both worlds: The first model of the 1800 series is equipped with USB3 vision interface. Models with MIPI CSI-2 are planned. The 1800 series can be used for both industrial embedded vision and machine vision applications. With an extended range of functions for image correction and optimization as well as various trigger functions, the camera series combines the advantages of classic industrial cameras with the advantages of integrated sensor modules. It opens new possibilities for the user to switch from PC-based image processing applications to embedded systems. Easy integration: The ALVIUM® technology ASIC supports all common sensor interfaces and is designed for a wide range of current and future image sensors with resolutions from VGA to 21 megapixels. For the CSI-2 models, a single driver directly supports all camera models. With minimal development effort, different cameras can be tested with different sensors, different resolution variants of a system can be developed, or existing systems can be converted to new sensors. This not only saves developers time, but also significantly reduces their development costs. In close partnerships Allied Vision develops Vimba CSI-2 drivers for Alvium cameras. A number of embedded boards such as NXP i.MX 6/8-based boards and the Nvidia Jetson boards, are initially supported. The USB variants can be easily integrated with the established Vimba Suite on Windows, Linux and Linux arm platforms.  

Read More

March Networks® New customization and search capabilities in Searchlight Business Intelligence Software

March Networks® has recently introduced new capabilities available in its powerful Searchlight software. Used by leading banks and retail organizations worldwide to extract valuable information on customer service, merchandising, operations, compliance and more, March Networks Searchlight™ helps businesses improve performance and profitability. Integrating clear surveillance video, relevant business data and highly accurate analytics, the software also enables organizations to proactively detect fraud and theft and quickly review suspect transactions – reducing investigation times by as much as 90%. With the launch of this latest version of Searchlight, customers benefit from enhanced filtering and customization features that make it easier to uncover losses and compare key performance indicators (KPIs) from multiple locations simultaneously. These new capabilities include: Expanded fraud/ loss detection reporting. Users can now combine specific transaction types with associated point-of-sale (POS) or ATM/ teller alarms to proactively pinpoint suspect incidents. A fraud investigator at a bank might set a business rule to report on all loan applications processed with no customer present, while a retail loss prevention manager may want to see all incidents where a no sale transaction is followed by the opening of a cash drawer. Users receive a list of all of their customized exceptions along with links to the recorded video so they can quickly scan through each incident and visually verify what occurred. Enhanced transaction pattern detection, which allows users to more precisely define suspect transactions by combining transaction types (e.g., withdrawals, deposits, voids, discounts or refunds) occurring within a set time interval. A retail employee voiding a transaction immediately following a cash transaction, for example, or someone conducting two ATM cash withdrawals below a set threshold within minutes might be committing a crime. This new Searchlight software capability helps investigators identify such theft and fraudulent incidents faster and provides clear video and data evidence to help them prevent recurring incidents from happening. People counting with employee filtering, through an integration with the latest FLIR Brickstream 3D analytic sensor, to provide highly accurate customer traffic data and sales conversion metrics. The feature uses a combination of Bluetooth low energy (BLE) technology and employee-worn tags to automatically identify and remove staff from customer counts, a process that can otherwise be manual or missing in today’s retail environments. Personalized reports that enable users to set and save ‘favorite’ dashboards incorporating data from multiple sites. The customized reports are ideal to help aggregate and compare KPIs such as the location with the highest percentage of voids or returns, or the most transactions per day over a defined amount. “These latest Searchlight capabilities make it even easier for our banking and retail customers to uncover, analyze and compare data that’s critical to the success of their business,” said Dan Cremins, Global Product Management Leader, March Networks, “With more than a decade of experience providing integrated video and data solutions to these markets, we’re now focused on expanding the applicability of the data within an organization, while constantly improving the user experience.”  

Read More