securitylinkindia

AI for the Security Industry: Real-World Applications

In recent years, Artificial Intelligence (AI) has been the buzzword in the video analytics domain. Trade show stands are rife with AI demos promoting ambitious functionality set to change the face of CCTV in security. Impressive as many of these demonstrations are, there is a definite air of scepticism on the part of the end-user. Is the hype around AI warranted, and can science actually deliver? This feels reminiscent of a decade ago when video analytics promised to revolutionise CCTV monitoring. Today, reliable and effective analytics is the mainstream and is driving tangible business value. That said, there is no denying that the last five years of AI innovation has led to tangible and practical solutions, with the security industry finally starting to reap the benefits. However, AI is now at a precipice – on the cusp of what industry experts call an ‘AI winter’ – so, everyone is wondering what’s next and what is possible. This paper investigates precisely this, focusing on the physical security space.   What is AI? One formal definition of Artificial Intelligence (AI) identifies the technology with the “development of computer systems able to perform tasks normally requiring human intelligence such as visual perception, speech recognition, decision-making, and translation between languages.” In reality, the term AI covers a wide range of applications and tends to refer to the current problem being tackled, which of course is constantly evolving. When we think of AI in the security industry, this usually translates to a few key areas:  Asset protection & monitoring.  Access control. Business intelligence. Decision support. Machine Learning is the process of teaching a system to perform a task, while Deep Learning is just a subset of Machine Learning. There are many other non-deep learning based ML methods which, for the purposes of this paper, will be referred to as traditional ML approaches. Often, when AI is mentioned, what is really being referenced is the Machine Learning (ML) or Deep Learning (DL) algorithm powering that solution. For example, license plate recognition (LPR) is often the application of a DL model to locate and extract a license plate from an image, coupled with ML algorithms cross-referencing information from a database. Therefore, this application should be referred to as a combination of ML and DL – not simply AI. The distinction between traditional ML and DL is an important one, as the recent boom in AI solutions often refers to advances in Deep Learning techniques. In the majority of cases, the use of Deep Learning has led to a significant jump in accuracy over traditional ML techniques. For example, a well-known academic image classification challenge, in which images must be classified into one of a thousand different classes, has seen a notable increase in accuracy – going from 50% of the images being classified correctly in 2011, using traditional ML techniques, to nearly 90% today using modern DL techniques. The figure below illustrates the improvement in the ImageNet challenge over time. Machine Learning vs Deep Learning To understand Deep Learning’s dramatic improvement over traditional Machine Learning techniques, let’s look at how an example asset protection use case could be approached with both methodologies. The goal is to detect if the object in the field of view of a particular camera represents a threat and should generate an alarm (person, vehicle etc), or constitutes mere background noise that can be ignored. To begin, through the use of a movement-based tracker (another ML system) a camera has detected motion and defined a region of interest around the object.   Machine Learning (ML) The traditional Machine Learning pipeline generally requires the developer to represent an input (e.g., a region of interest in an image) into a structured feature descriptor of that input: for example, a set of numbers that represents the shape in the image (HOG, SIFT), or possibly another property in the image (colour, texture etc). The model is then trained by feeding labelled examples of the object feature descriptors you want to recognise (person, vehicle) and object feature descriptors of objects you expect to see but want to ignore (trees, shadows, animals etc.). The Machine Learning algorithm learns to group these feature descriptors into these categories so, when a new unlabelled feature representation is fed to the system, it can make an assessment as to which category it might fall into. A system’s accuracy hinges on a developers’ ability to come up with a feature descriptor which the Machine Learning algorithm can easily group into classes to detect vs those to ignore. One of the biggest advantages of using human-designed feature descriptors is the data required to train the ML model is reduced. Creation of labelled datasets to train any Machine Learning algorithm takes significant time and therefore resource. As a consequence, traditional Machine Learning techniques are still very much relevant due to this significant time and cost-saving. Deep Learning (DL) Deep Learning follows a similar process. However, instead of relying on a human-in-the-loop method of developing a robust feature descriptor, the Deep Learning system itself just looks at the labelled input data to learn the best way of grouping the images. By showing the system large numbers of samples (training), the system refines its model to best describe the data it is being shown. The disadvantage is that, for a Deep Learning model to learn that best representation from the data, a notably larger amount of data is necessary. However, although the data requirements are more significant, the Deep Learning approach removes the guesswork of a developer trying to define the optimal representation of an input to enable the system to learn. It also has the advantage that the same approach can be applicable to a range of different problems, whereas traditional ML may require redesigning the feature descriptor based on the application. Deep Learning has demonstrated its advantages over traditional methods. However, the real question is how it can be used to improve business processes or increase precision in detection, while reducing costs for security businesses….

Read More

Transcending the Norm in Cash-in-Transit

In a world of constantly evolving economy, robbery, theft and other property crimes are also rapidly increasing. The need for businesses and organizations to outsource their banking transactions and have professional couriers handle their cash logistics becomes a necessity. While it’s true that cash management can be expensive, it also entails managing risks for both the couriers and the clients. For some cash-in-transit (CIT) companies, the use of uniformed and armed CIT professionals is deemed necessary. Others even utilize armoured trucks or armoured transport services. These vehicles are mostly bulletproof and are fashioned to transport extremely large quantities of money, ATM replenishment, and transport dignitaries or VIPs. However, not all cash-in-transit companies employ uniformed couriers and armoured vehicles. Why are covert operations better? Since the main obligation of any cash-in-transit company is to collect and deliver cash or a client’s valuables to the bank or any designated point, some companies find the use of armoured vehicle services essential for the business. But how safe is their hard-earned money in the hands of these couriers? According to a publication from the Australian Institute of Criminology, a total of 89 robbery incidents were recorded by Australian CIT companies over a 20-year period (1989-2008); specifically, there were 18 incidents in 2007 and 11 incidents in 2008. In the book entitled Encyclopedia of Victimology and Crime Prevention by Bonnie S. Fisher and Steven P. Lab, it was mentioned that even though most robbers target banks or any financial institutions, others still prefer robbing cash-in-transit vehicles. The robbers depict two main methods in committing the crime: (1) stopping and then attacking the CIT vehicle or (2) robbing the driver and couriers during delivery or after cash collection. As the leading cash-in-transit company in Australia, SecureCash focuses on covert operations. While using armoured trucks may be the norm in the security service industry, SecureCash has always operated in unmarked, soft-skinned vehicles and have never utilized armoured transports as part of its CIT fleet. From a security standpoint, a covert operation is a safe and risk-free approach to delivering an efficient cash-in-transit service. It eliminates risks During the transfer of cash or other valuables, the business becomes exposed and vulnerable to risks such as robberies. Try to imagine a big armoured vehicle or an armoured truck pulling up outside the office or home. This will certainly catch the eyes of criminals, from would-be thieves to organized crime syndicates. These criminals may decide not to rob the armoured truck or attack the couriers, but rather choose to plot a robbery right at the business location or home. By not using armoured vehicles, it will not only keep the couriers and drivers away from possible threats, but it will also ensure that the valuables and the client’s business stay safe. Aside from discouraging the use of armoured vehicle services, the bank couriers do not wear security uniforms or any marked, printed, easy-to-spot clothing. This is to avoid drawing too much public attention during the cash handling process. It enhances security SecureCash couriers are trained to master the art of blending into the crowd. In this way, they will be much harder to spot by anyone who’s plotting a robbery or theft. Since they are not easily recognised, their cash transfer patterns are unpredictable and more difficult to analyze. Likewise, an armed security guard or uniformed personnel coming in and out of the office, collecting and carrying an obvious bag of cash indicates a green signal for those prying criminal minds who are just waiting for the right opportunity. It’s the same as advertising to the public that a person has huge amounts of cash on-site to warrant the service of cash couriers. This is what Secure Cash has been trying to prevent, so clients will remain dedicated and keep the trust that they have given to the company for the last 25 years. Bethaney Bacchus, General Manager of SecureCash, shared that specializing in covert cash handling operations has provided many growth-oriented opportunities for the company and helped build quite a reputation among clients and partners nationwide. She added, “We save time for busy people by performing the banking duties, we offer a secure service by taking the risk away from people who are fearful to carry cash in public, we offer convenient service for people who suddenly find their bank branch has closed.” Managing cash and other valuables may be an expensive and risky venture, however, implementing tried and tested innovative solutions prove to be the key to a successful business operation. With the emergence of many security service providers in Australia, the effectiveness of one’s services provides the business with an extensive competitive advantage. To be a market leader in the industry, one must be the person who goes beyond the norm.  

Read More

Skybox Security Appoints Shantanu Srivastava as Vice President of Asia-Pacific Japan Sales

Skybox® Security recently announced that Shantanu Srivastava has joined the company as the Vice President of sales for the Asia-Pacific Japan (APJ) region. Srivastava brings to the company more than 25 years’ experience in enterprise software sales, with more than 15 years in leadership sales roles in Singapore and Hong Kong. He joins Skybox from BlackBerry where he led and rebuilt sales activity for the company in APJ by establishing new operations, a talented team, new channels and key accounts infrastructure. We are extremely pleased to have Shantanu join our team to lead our Asia-Pacific Japan theatre,” said Skybox EVP Worldwide Sales and Field Operations Rob Rosiello, “As well as having a consistent record delivering growth, Shantanu is a proven leader with deep domain expertise. We were impressed by his ability to provide value through a client-centered solutions approach, his work with strategic channel and integration partners and, especially, delivering client satisfaction. We happily welcome his appointment. Responsible for APJ sales and field operations, Srivastava will enable Skybox to continue with its strong record of growth in the region and help lead the strategic theatre into its next stage for the company.  

Read More

Axis Expands Footprint in Kolkata with Innovative Products & Technologies for a Smarter, Safer Tomorrow

Axis Communications announced the expansion of its footprint in Kolkata and the eastern India region and shared the successful implementation details of their association with Kolkata Police for surveillance and traffic management on the streets of Kolkata. The event also showcased their integrated smart solutions in IP audio, radar technology, network cameras, and thermal cameras. Centered around their philosophy of ‘creating a smarter & safer tomorrow,’ the event brought to fore Axis’ recent success stories and their key takeaways from prestigious surveillance implementations across the country, including the implementation of surveillance systems in Vivekananda Stadium, Salt lake during FIFA U-17 World Cup, in 2017. Kolkata is the gateway to the eastern part of India. With a mixed floating population and its residents, Policing is a tough job. In order to assist the law enforcement better, Kolkata Police, deployed Axis Cameras with two primary objectives: Traffic monitoring. Maintaining general surveillance on the streets of Kolkata to make it a safe city for the residents. The Government of West Bengal has been proactive in adopting a one-of-its-kind smart surveillance implementation. As Kolkata Police has always been the forerunner of the agenda of making Kolkata the safest city for the residents, the partnership with Axis Communications has successfully helped them in setting up high-resolution cameras across the city. Additionally, Axis ZipStream Technology has helped them optimize bandwidth and overall storage requirements of the mass video produced throughout the day, 24*7. This, in return, will help them track, monitor, and analyze the video feed for detecting criminal activities, traffic violations, and road conditions real time. Highlighting the efforts that led to the successful association with Kolkata Police, Sudhindra Holla, Director – India & SAARC, Axis Communications said, “We are proud to be a partner of choice for the Kolkata Police city-wide project. This is an example of a city authority participation towards building a safer and secured smart city. We have 800+ camera installations across the city to track, monitor and analyze the video feed for detecting criminal activities, traffic violations and road conditions. With our strong portfolio of product line-up, we aim to support the authorities to deliver high surveillance and build a model smart city.” “Axis carries a rich lineage of more than 35+ years and during the time, we understand the pulse of the India market. Supporting PM Narendra Modi’s much envisioned smart city programmes, we believe that high end surveillance solutions are the need of the hour,” he added. Speaking on the Vivekananda Stadium implementation, Sudhindra emphasized, “This project was challenging as it demanded a state-of-the-art security system that matches the International standards of FIFA. With our global heritage of meeting the needs of the customers’ requirements with high definition products and solutions, we extended our hand towards securing the entire stadium with our high-end technologies. For example, the Light-finder technology which makes dark areas visible and captures all minute details even in darkness and forensic wide dynamic range reveals details in difficult lighting by applying multiple exposure levels, contrast enhancement, and advanced algorithms that lower noise and increase the image signal. The Vivekananda Yuva Bharati Kriranga, is India’s second largest stadium with a seating capacity of 85,000 people. Our motive was to ensure that the work was seamless and met the requirements of the organizing committee.”  

Read More

CAPSI AWARDs CORONA WARRIORS

The declaration by the Government of India that the private security services are a part of the essential services during lockdown owing to the spread of Corona indeed came as a feather in the caps of the nine million private security personnel of the Indian private security industry (PSI). While majority of the nations’ population were confined to their respective homes, the brave security guards have been performing their duties outside their homes with utmost diligence and sincerity drawing the appreciations of all fellow countrymen. Late Tayappa Balu More, the first Covid Casualty of private security guard, was employed with Checkmate Services Private Limited, Mumbai since 07 June 2012. When he breathed his last on 17 April 2020, he was performing his duties at Aditya Birla Centre, Nyloc House, Worli. He served at many important locations, but bulk of his tenure was at Aditya Birla Centre only. He was very reliable, sincere and dedicated to his profession and as a result often chosen for important assignments. Late Tayappa Balu More is survived by his wife and two children.   Combating all odds like unavailability of public transport, inadequate protective equipment, exposure to the dreaded virus, the security guards have stood tall. These Corona Warriors have come to light when they selflessly acted in the cause of humanity beyond their call of duty. The Central Association of Private Security Industry (CAPSI), the flag bearer for the cause of the well-being of the PSI has taken cognizance of the grit and determination being displayed by the security guards under such unprecedented circumstances, and decided to honour those Corona Warriors who have displayed exemplary devotion to duty in their fight against the COVID 19 pandemic. A three member CAPSI Corona Warrior Award (CCWA) Committee headed by C Pal Singh, Former IG Police, Punjab, National Honorary Director General, CAPSI has been constituted to set parameters and select most deserving security guards and officers for the award. The Award comprises a Golden Trophy and a cash award of Rs.1,00,000. The Committee will assemble every month and based on the citations received, will declare the awardees.    Late Dashrath Waghmare Shankar joined G4S March 2005 and his last deployment was at Accurate Industrial Controls Pvt. Ltd., Pune. He stayed in Pune with his wife and 2 children. He performed his last duty on 07 April and died of COVID 19 on 12 April 2020 at the age of 48 years. G4S team provided all necessary supports to him and his family during and post demise. As per G4S policy, his family was paid with ex-gratia amount of Rs.75000 and funeral support of Rs.2500.   For the month of April 2020, the Committee has announced the names of Late Tayappa Babu More of Checkmate Services and Late Dashrath Waghmare Shankar of G4S Security for the Corona Warrior Award posthumously. The award shall be presented to the next of kin (NoK) at a special awards ceremony to be organized at Delhi.  

Read More

Beyond Security: Access Control for Multi-Tenant Sites

  Access control systems are, of course, synonymous with security. Keeping people safe and places secure is their primary role. When these places are multi-tenant sites – with multiple subgroups of users with their own group and unique permissions – the access and security challenges are more complex. But even these can be well managed with intelligent integrated access control systems. Integrating CCTV, running sophisticated ‘cause and effect’ protocols, having a robust intruder detection system and strong cyber security measures are all essential components. But as an access control manufacturer, we carefully design our products to provide benefits beyond security too, making life easier and more pleasant for tenants and users, as well as security managers and site owners. Read on for our top nine ‘beyond security’ benefits that Inner Range intelligent access control systems can offer multi-tenant sites. 1. Partitioned systems Ok, this first one is a cheat because it is about security. But it’s highly useful for multi-tenant sites and not many access control systems offer this feature. Our enterprise level access control system, Integriti, offers ‘partitioned sites.’ This allows security managers to create users and other global entities that only exist within the partition they were created in. The partitions are completely isolated and invisible to users in other partitions, greatly reducing the chances of cyber criminals or rogue users accessing protected areas and information. 2. Smartphone access As we streamline our wallets and move increasingly to digital platforms, tenants and users can be set up to use their smartphones to open doors and other smart devices. This usually requires them to download a secure mobile app and then our Integriti system can read and check security credentials from users’ mobile phones to determine whether they are allowed access. 3. Managing visitors Applications to manage visitors ensure a secure, reliable and trusted method of managing visitors and stop receptionists getting bogged down creating credentials when visitors arrive. These systems can allow business tenants to issue temporary passes for their own visitors without needing to pass every request through a central security team. The passes can usually be issued on paper or in advance via email. They can also be issued as Apple Wallet or Google Pass credentials. These appear on the visitor’s smartphone with a QR code without the visitor having to search their phone for them. Location and time-based information included in the pass ensure it appears when and where it is needed. The passes can be read by our Integriti system at door entry readers, entrance turnstiles and lifts to ensure visitors only access areas agreed by the ‘host’ offering an efficient and hassle-free experience for everyone. 4. Parking made easy All our systems offer automatic number count that triggers to show whether car parks are full or still have space available when someone is approaching the entrance. Our Enterprise product, Integriti, can integrate with ANPR providers that read vehicle number plates and allow access for those with correct permissions including disabled users and/ or VIPs. 5. Cashless vending All user profiles can be loaded with credits for users to purchase drinks, food and other items on site. This saves time for users who don’t have to wait in long queues at lunch time and is easier for canteen workers who don’t have to deal with cash. 6. Heating and lighting efficiencies Everyone is concerened with their carbon footprint these days and our access control systems can be used to track when and where people are on site, meaning organisations can update heating and lighting timers to reflect what users really need. Access control systems can also be used to create automated heating or lighting actions in reaction to specific alerts such as lights coming on when a particular door is opened or when a certain number of people have entered a building or room. These measures make life more comfortable for users while also saving money and improving the environmental credentials of the site owners. 7. Automatic renewal reminders Our access control systems can be used to manage a range of permits and licences. For example, some clients offer parking permits that need to be paid for. Our access control systems will send automatic notifications when a permit or licence is about to expire, reminding them to top up or renew, and avoids frustration at the car park barrier if a permit has expired. 8. Health and safety certificates The reminder service mentioned above also applies to a host of health and safety licences and certificates. It’s imperative for companies to keep first aiders and machine operators up to date with training and mandatory refreshers. Our Integriti access control system will send automatic notifications when certificates are nearing expiration so individuals and companies have time to train or refresh skills as required. This takes pressure off health and safety managers who don’t have to record and remember all this information themselves and reduces the risk of an accident and/ or liability. 9. Automatic muster reports All our products, including our entry-level access control system Inception, offer automatic muster reports. These show who is where on site and can be scheduled to run in the event of a fire alarm to help with health and safety procedures. The alternative is a manual register of users in the event of an emergency, which is much more time-consuming. The fact our muster reports show the last known location of users means that if someone is missing, site managers or emergency crews will have a much better idea as to where to start searching.  

Read More

Mistral Announces new AI-enabled Thermal Screening Systemfor Body Temperature Detection

Mistral Solutions, a leading technology design and system engineering company, announces the introduction of an ‘automated thermal screening system,’ a body temperature detection and alert system for large establishments and public places to be placed at the entry and exit points The COVID-19 pandemic has brought in unprecedented situations and is expected to make a long-term impact across the globe. As governments mandate screening of people at the entry and exit of establishments to track the body temperature, enforcement agencies are confronted with this massive challenge. Moreover, the traditional methods of screening are mostly man-managed, resulting in delays, congestion, and have their own limitations such as close contact with people, high risk of transmitting infection, high cost, low efficiency, etc. Mistral’s automated thermal screening (ATS) system is an artificial intelligence enabled mass people screening solution for establishments where a high footfall is expected, viz., malls, railway stations, bus stations, airports, public/ private organisations, factories etc. Mistral’s ATS system offers various benefits over traditional thermal traditional systems. The automated system effectively reduces manpower requirement and close contact between people. The ATS system offers faster people detection and temperature measurement and generates real-time, accurate data for active monitoring and quick decision making. Automated thermal screening system can perform simultaneous temperature screening of multiple people with an accuracy of ±0.5°C. The system consists of thermographic cameras, multi-channel NVR, PoE switch and an optional black body calibrator for higher accuracy. “Mistral has always been a trustworthy partner offering cutting-edge solutions for government, defence and homeland security applications for the past 22 years. The ATS solution from Mistral is aimed at providing organizations an affordable solution to fight the extraordinary situation created by the Covid-19 pandemic. We believe that the ATS system will aid large establishments and government bodies in controlling the spread of Covid-19 by effectively monitoring people entering their premises,” said Anees Ahmed, President, Mistral Solutions Pvt. Ltd. Features of ATS system Automated temperature screening with an accuracy of ±0.5°C.  Continuous monitoring with very low error status. Detection of up to 30 people at a time. Temperature measurement range of 86-113°F. AI-enabled mass detection. Detection and screening from 0.8 to 9 meters. Real-time alarms. Lower manpower usage. Generates real-time data and analytics. Centralised data management. Optional black body calibrator for higher accuracy.  

Read More

CXO Research: Legacy Technology & Lack of Skills Hindering Digital Transformation and IT Modernization

Digital transformation is redefining the competitive business environment at an unprecedented rate. Anchored on key technologies like cloud, virtualization and modern storage systems, modernization of IT is critical to deliver business continuity for rising customer expectations and de-risking business from evolving cyberattacks plus compliance measures. Our Veeam 2020 Data Protection Trends Report puts the spotlight on the importance of data management and protection across hybrid cloud environment. As the demands of a modern enterprise gets complex, it’s not enough for data to be backed up; data must in fact move to the higher state of intelligence and automatically anticipate demand, securely across physical, virtual and cloud environments. A simple, flexible and reliable Cloud Data Management solution is critical to build a robust foundation for today’s digital business As organizations look to transform their business operations and revolutionize customer service, digital transformation (DX) is at the top of most CXOs’ agendas; in fact, DX spending is expected to approach $7.4 trillion between 2020 and 2023, with a CAGR of 17.5%. However, according to the latest industry data recently released from Veeam® Software, the leading player in backup solutions that deliver Cloud Data Management™, almost half of global organizations are being hindered in their DX journeys due to unreliable, legacy technologies, with 44% citing lack of IT skills or expertise as another barrier to success. Moreover, almost every company admitted to experiencing downtime, with 1 out of every 10 servers having unexpected outages each year – problems that last for hours and cost hundreds of thousands of dollars – and this points to an urgent need to modernize data protection and focus on business continuity to enable DX. The Veeam 2020 Data Protection Trends Report surveyed more than 1,500 global enterprises to understand their approach toward data protection and management today, and how they expect to be prepared for the IT challenges they face, including reacting to demand changes and interruptions in service, as well as more aspirational goals of IT modernization and DX. “Technology is constantly moving forward, continually changing, and transforming how we do business – especially in these current times as we’re all working in new ways. Due to DX, it’s important to always look at the ever-changing IT landscape to see where businesses stand on their solutions, challenges and goals,” said Danny Allan, CTO and SVP of Product Strategy at Veeam, “It’s great to see the global drive to embrace technology to deliver a richer user experience, however the Achilles Heel still seems to be how to protect and manage data across the hybrid cloud. Data protection must move beyond outdated legacy solutions to a higher state of intelligence and be able to anticipate needs and meet evolving demands. Based on our data, unless business leaders recognize that – and act on it – real transformation just won’t happen.” The criticality of data protection & availability Respondents stated that data delivered through IT has become the heart and soul of most organizations, so it should not be a surprise how important ‘data protection’ has become within IT teams, including not just backing up and restoring data, but also extending business capabilities. However, many organizations (40%) still rely on legacy systems to protect their data without fully appreciating the negative impact this can have on their business. The vast majority (95%) of organizations suffer unexpected outages, and on average an outage lasts 117 minutes (almost two hours). Putting this into context, organizations consider 51% of their data as ‘high priority’ versus ‘normal.’ An hour of downtime from a high priority application is estimated to cost $67,651, while this number is $61,642 for a normal application. With such a balance between high priority and normal in percentages and impact costs, it’s clear that ‘all data matters’ and that downtime is intolerable anywhere within today’s environments. “Data protection is more important than ever now to help organizations continue to meet their operational IT demands while also aspiring towards DX and IT modernization. Data is now spread across data centers and clouds through file shares, shared storage, and even SaaS-based platforms. Legacy tools designed to back up on-premises file shares and applications cannot succeed in the hybrid/ multi-cloud world and are costing companies time and resources while also putting their data at risk,” added Allan. DX and the Cloud Enterprises know they must continue to make progress with their IT modernization and DX initiatives in order to meet new industry challenges, and according to this report’s feedback, the most defining aspects of a modern data protection strategy all hinge upon utilization of various cloud-based capabilities – organizations’ ability to do disaster recovery (DR) via a cloud service (54%), the ability to move workloads from on-premises to cloud follows (50%), and the ability to move workloads from one cloud to another (48%). Half of businesses recognize that cloud has a pivotal part to play in today’s data protection strategy; and it will most likely become even more important in the future. For a truly modernized data protection plan, a company needs a comprehensive solution that supports cloud, virtual and physical data management for any application and any data across any cloud. Allan concluded, “By already starting to modernize their infrastructures in 2020, organizations expect to continue their DX journey and increase their cloud use. Legacy solutions were intended to protect data in physical datacenters in the past, but they’re so outdated and complex that they cost more money, time, resources and trouble than realized. Modern protection such as Veeam’s Cloud Data Management solutions, go far beyond backup. Cloud Data Management provides a simple, flexible and reliable solution that saves costs and resources so they can be repurposed for future development. Data protection can no longer be tied to on-premises, physically-dedicated environments and companies must have flexible licensing options to easily move to a hybrid/ multi cloud environment.” Other highlights of the Veeam 2020 Data Protection Trends Report include: The no. 1 challenge that will impact organizations within next 12 months is cyber…

Read More

COVID-19 Accentuates the need for Data Security and Cyber Security Protocols: Sun Life ASCI

  Sun Life ASCI is committed to the fundamental principles of information security – confidentiality, integrity and availability. With work-from-home becoming the new normal, there is a greater need for organizations to maintain a robust and reliable security framework. It is equally critical to keep employees informed about best practices, elevate their awareness and maintain stringent compliance. We strongly feel that enterprises with secure technology and communication platforms would always fare better in times of crisis and ensure business continuity with minimal risk exposure   The COVID-19 pandemic has presented an unprecedented global crisis impacting everybody’s professional and personal lives. Organizations have been coerced to adopt work from home (WFH) to enable business continuity, which is turning out to be the ‘New Normal’ now. As a global financial organization, it became imperative for Sun Life Asia Service Centre India (ASCI), (the Global in-house Center of Sun Life Financial), to ensure that its operations, network and critical infrastructure are highly secure and stable. Sun Life ASCI has deployed robust and advanced cyber security solutions to ensure a stable and secure network for its employees to support business operations securely while working from remote locations. All the assets are regularly scanned and patched to ensure there are no vulnerable attack vectors available for the attackers. The organisation has a centralized global SOC (Security Operations Centre) which continuously monitors remote access logs and alerts for anomalies. The internal access policies and firewalls are constantly reviewed and updated and all access to the employees are provisioned based on ‘Least Privilege’ and ‘Need to know’ principle. Employees have been advised to use the secure connection to Sun Life network by ensuring VPN only usage on company-owned hardware with up-to-date security features, to prevent any infected data/ malware into the company’s network. During a long remote access session, employees are required to re-authenticate themselves. Endpoint devices are one of the most critical type of equipment when employees work from home. They are also an easy target for cyber-attacks while the world grapples with the pandemic making it even more important to secure endpoint devices. At Sun Life ASCI, IT team has updated its endpoint device policy framework to block installation of unauthorized utilities/ applications. Full disk encryption has been enabled on employees’ laptops. All employee’s handheld devices are completely protected by MDM (Mobile device management). Antivirus and anti-malware solutions are deployed on the end user devices. The organisation has deployed a phishing defense solution to minimize attacks and continuously educates employees on different phishing scenarios. Constant communications with employees on best security practices; sharing of data security videos and circulation of critical updates relating to the operating system and other applications educate them about the same. Email security policies are reviewed to make them more stringent and filter out malicious emails. ASCI also has a 24×7 IT and security support desk to manage any incidents and queries. Data security as a topic is also discussed in virtual townhalls and leadership messaging.  

Read More

Radar Technology in Surveillance

This white paper discusses radar technology in security applications, and compares it with other available technologies. It also provides specific information about AXIS D2050-VE Network Radar Detector, its usage and its possibilities What is radar? Radar is a well-established technology for detecting objects. It was developed for military use in the 1940s, but is now widely used in civilian applications, for instance weather forecasts, road traffic monitoring, and collision prevention in aviation and shipping. Using radar technology for detection can reduce the number of false alarms and increase detection efficiency in conditions with poor visibility. AXIS D2050-VE Network Radar Detector is Axis’ first available radar-based motion detector. Owing to its advanced tracking algorithm, it is not only an affordable complement to security cameras, but it can also add valuable features to a surveillance system.   A radar device transmits signals consisting of radio waves, or electromagnetic waves in the radio frequency spectrum. When a radar signal hits an object, the signal is reflected or scattered in many directions. A small portion of the signal may be reflected back to the radar device, where it will be detected by a receiver. The detected signal provides information that can be used to determine the location, size and velocity of the object that was hit. Why use radar in surveillance? Due to its superior detection abilities in darkness or fog, a motion detector based on radar can be a cost-efficient complement to other types of surveillance. Reliable in challenging conditions By nature, radar surveillance is not dependent on visibility. Darkness, fog, or even moderate rainfall does not impair the detection abilities. There are other surveillance technologies that may also work in such conditions, for example thermal cameras equipped with video analytics, or PIRbased (passive infrared) motion detectors. However, surveillance based on radar can be a cost-efficient alternative to both solutions. Radar is easier to use, and more affordable than a thermal camera. Radar can also provide more information, at a longer range, than a PIR motion detector. Decreased false alarms Reducing the number of false alarms, while maintaining the detection efficiency of real incidents, is essential in surveillance. For example, alarms are often used to trigger a video recording. In case a forensic search would be needed in alarm-triggered recordings, it could be very time consuming to go through the recorded material if there were many false alarms. Motion detection systems often use video analytics applications that are triggered by a certain amount of pixel changes in the surveillance scene. Unnecessary or ‘false,’ alarms can typically be caused by effects such as moving shadows or light beams, small animals in the scene, rain drops or insects on the camera lens, movements caused by the wind, or bad weather. A detection system based on radar will only detect physical movement in a scene, ignoring purely visual effects such as shadows or light beams. Radar signals should also be generally less affected by rain or snow. In both radar detection and video analytics, it is possible to design the system so that small or swaying objects can be filtered out, as well as certain zones of irrelevant movements caused by, for example, wind in a tree. Complement to cameras A motion detector based on radar, exclusively, will not provide any visual confirmation. To efficiently identify the cause of an alarm, or to enable identification of individuals, the scene should also be monitored by a video camera. To add further value, rules could be established that state that only when both the video camera and the radar detector detect motion in an area will a motion detection alarm be transmitted to the operator or central monitoring station, along with detailed information about the object in motion. Such a collaborative validation can reduce false alarms even further. Axis network radar detector AXIS D2050-VE network radar detector is Axis’ first available radar-based motion detector. It can serve as an affordable complement to security cameras in medium-risk installations, improving detection in challenging conditions and minimizing false alarms. Owing to its advanced tracking algorithm and the positioning information it provides, the detector can also add new features and value to a surveillance system. Detection range and installation One radar detector unit provides accurate detection within a range up to 50m (164ft), within an angle of approximately 120 degrees. For coverage of a larger area, it is possible to use multiple detectors. Typical mounting height should be 3-4m (9-13ft). AXIS D2050-VE can be used as a stand-alone product, but may serve its purpose best as a complement to a camera that also provides a visual view of the scene. In order to facilitate a visual interpretation of the scene, the radar image as it is seen in the user interface can be easily integrated and calibrated with an uploaded reference map. The detector can be treated like a camera in the security system. It is compatible with major video management systems (VMS) and common video hosting systems. The detector comes with Axis open VAPIX interface enabling integration on different platforms. Typical installation scenes include fenced-off areas such as industrial properties or roofs, or parking lots where no activity is expected after hours. However, the detector’s advanced filtering and tracking function makes it valuable in most environments. Figure 2 shows a parking lot as monitored by the network radar detector and shown in the user interface. The radar image has been combined with a reference map of the scene. Include/ exclude zones The network radar detector comes with an intuitive user interface where the user should draw one or more ‘include zones,’ and possibly ‘exclude zones,’ within the detection range. Detection and tracking of objects takes place continuously within the whole detection range. However, owing to its filtering functionality, the detector will trigger actions only on objects detected within an include zone. The filter can also be set to ignore certain object types, and only trigger on, for example, large objects, only vehicles, or objects that have been tracked for a…

Read More