securitylinkindia

La Maison Royale Chooses Matrix Telecom Solutions for Multi-Site Connectivity

La Maison Royale, Nairobi, is a 4-star superior boutique business hotel with a ‘French taste,’ state-of-the-art facility and close to the entertainment in the Westland neighborhood, La Maison Royale is a unique experience. La Maison Royale prides itself with the friendly staff and the practical touches that make being away from home easier, whether a person books their rooms by day, week or longer. Travelling for business, looking for temporary or corporate housing, needing short-term housing during relocation, or planning a weekend getaway, La Maison Royale has a solution that will fit everyone’s budget. Challenges La Maison Royale has their prominent presence across several locations in Nairobi. Considering this, they required seamless connectivity within sites. A system for call accounting, budgeting and routing with hospitality features was their primary requirement. Furthermore, a comprehensive and scalable solution that does not need a transformation in the coming years was their main challenge. The hotel infrastructure required a centralized communication management of all business communication. Besides, they were looking for a multi-site connectivity with call accounting and call budgeting.     Solution Matrix addressed these challenges by proposing SARVAM UCS, which is a unified communication server for modern enterprises that manages all business communications from one place. SARVAM UCS is an enterprise-grade unified communications solution that offers La Maison Royale the much needed collaboration, communication, messaging and mobility between multi-locational sites. Unifying all the communication networks and devices provides users with the flexibility of accessing the calls, messaging and voice mails from any of the devices irrespective of their location. Results Unified Communication for workforce collaboration and better customer responsiveness: Call management and the ability to connect from anywhere, anytime and with anyone. Simple administration and management due to webbased configuration.  Enhanced customer responsiveness to customer/ clients.  Scalability to expand their business footprints in the future.  Leverages existing infrastructure and connect on a common communication platform.  IP-solution at core and application upgradation paths that renews and extends investment.  

Read More

Sanjivani Group of Institutes Ensure Health and Safety with Prama Hikvision’s Advanced Temperature Screening Solutions

  Maharashtra’s pioneering educational institution, Sanjivani Group of Institutes, has ensured the health and safety of all the stakeholders through Prama Hikvision’s advanced temperature screening solutions. It is one of the finest examples of back to the business applications being successfully implemented in the education sector during the COVID-19 pandemic situation. With Empowering thousands of young students through education in the rural Maharashtra as the mission, Sanjivani Group of Institutes situated at Kopargaon, Ahmednagar, is a premier institute for MBA, Engineering, Pharmacy, Nursing and Diploma studies. The Sanjivani Rural Education Society (SRES), was established by Hon’ble Shankarrao Genuji Kolhe in 1983, at Kopargaon, rural domain in Ahmednagar district of Maharashtra, India. As the educational scenario changed and evolved with time, the management understood the need and added a number of courses under the umbrella of the Sanjivani Rural Education Society (SRES), which subsequently established the Sanjivani College of Pharmaceutical Education and Research, Sanjivani Senior College, Sanjivani Junior College, Sanjivani Group of Schools including Sanjivani International school, Shirdi and Sanjivani International school, Navi Mumbai. Health and Safety challenges When the pandemic crisis occurred, there were a lot of discussions and deliberations among the Sanjivani Group’s management. They were getting prepared for it, by analysing all the challenges faced during the lockdown and specific criteria for the situation. “We are sure the educational institutes in the post lockdown scenario will be facing a whole new set of health, safety and security challenges related to temperature screening, social distancing and crowd flow control. These challenges are relatively new challenges compared to the traditional education security challenges. We decided to take these challenges head on, to match up to the expectations of all our stakeholders,” said Amit N Kolhe, Managing Trustee, Sanjivani Rural Education Society (SRES). Technology innovations The management was looking for a temperature screening solution that can be used for teaching faculty, staff, students and visitors to comply with the health and safety guidelines. The request for the proof of concept was floated in the market. It was a pleasant surprise, the OEM and SI partner were ready within a shortest possible time. They offered a robust solution, the effectiveness of the temperature screening solution for operational safety was unmatched. The AI detection function ensured that there were no recurring false alarms. Temperature screening installations Many advanced artificial intelligence (AI) enabled temperature screening solutions were installed in Sanjivani Group of institutes to comply with health and safety guidelines. The seamless integration of these solutions was done to ensure students, faculty and staff should be safe in the ongoing pandemic situation. Win-win experience The Sanjivani Group of Institute’s association with Prama Hikvision has evolved over the time. It was a win-win experience for both the sides. Advantages   The management did extensive study and research, they found out what are the critical requirements. The Sanjivani Group of institutes’ campus on a regular day had 8000 students present, it was a gigantic challenge for the management. The temperature screening solutions provided by Prama Hikvision really helped to do the temperature screening of the visitors. It also helped in bifurcating and identifying the unauthorized visitors coming to the campus.     Being on the management side, it was important for us to make sure that best of the best technologies was given to students and stakeholders. We have given maximum focus on safety and security of the education ecosystem. We think it worked very well for us. We are really thankful to Prama Hikvision for providing all the solutions and lots of value added services. Installing security system is one aspect, but service is another, which is really an important factor. Prama Hikvision supported us by giving the excellent service “We have ensured that proper training is given to our security personnel and staff to handle the security systems, solutions and IT solutions back end. The temperature screening solutions worked very well for our requirements. Earlier we had to screen the students and staff one by one, which was quite cumbersome. Now with the latest AI enabled temperature screening solution we are able to screen a large number of students and staff at a much faster rate. It has really helped us a lot,” said Amit N Kolhe. “Temperature screening solutions project for Sanjivani Group of Institutes, Kopargaon was a great learning experience. We value Prama Hikvision’s experience and expertise in providing the latest and innovative security solutions. They work very well with vendor partners to deliver solutions that suit the requirements. Their professionalism and quality services are always appreciated. We find their objective advice very valuable, while designing security solutions and selecting equipment to install,” said Hemant Rokade – Director Sales, OM Agency, Prama Hikvision’s System Integration Partner.  

Read More

Remote Working Made Safer Using Access Gateway

The COVID-19 pandemic has forced many organizations to adapt to a new reality where much of the staff have to work from home. This poses significant challenges because the existing VPNs the companies had in place were not designed to handle a sudden explosion of remote workers. With infrastructure becoming expensive it’s a good opportunity to have remote access with zero trust architecture to provide a safe and secure remote working environment for employees. Many organizations that had been reluctant in moving towards remote access were found to be completely unprepared to tackle the sudden lockdown, which negatively impacted their businesses. To overcome situations like these, different business units, project groups, partners, contractors and guests require secure and different levels of remote access and often require a user experience tailored to employees unique requirements and devices. Mobile devices and bring your own device (BYOD) present additional challenges in providing on-demand connections in a manner that keeps data secure in the corporate network and limits exposure. But with just remote access there also comes the vulnerability of an opportune moment for the hackers to execute cyber-attacks and gain access to sensitive data of commercial value.   The increasing global spike in the number of phishing emails from last few months is not new to anyone. These have been indicating a serious and targeted attempt to exploit the anxiety related to the pandemic. Remote access in combination with zero trust is the perfect solution to counter such threats. With Array’s Network ADC, SSL VPN and WAF solutions, organizations will be at an advantage. This combined with zero trust – a security concept centered on the belief that organizations should not automatically trust anything inside or outside its perimeters and instead must verify anything and everything trying to connect before granting access gives organizations an edge like never before Array’s secure remote access solutions provide greater levels of security, a greater range of access methods, a broader range of device support and the ability to provide differentiated, identity-based access tailored to the needs of multiple communities of interest. Besides, with Array’s secure mobile access solution, sensitive data remains protected on the enterprise network and is accessible anytime, anywhere, so BYOD becomes an advantage rather than a threat to security. Mitigating risks associated with business continuity events and realizing gains through higher employee productivity are driving increased demand for remote access. While traditional VPNs are well suited for giving remote access to employees they are not as adept at supporting office workers. Remote access can be cost-effectively scaled for as many workers as needed even from a single appliance. It’s not just employees, even third-party vendors who work remotely have the advantage of being under the protection of Array’s remote access solutions. What’s more, because data never leaves the network, security is assured. The Covid-19 situation has led to a significant rise in phishing attacks and social engineering scams. Threat actors are using Covid-19 themes to trick users into clicking on malicious links that spread ransomware, harvest credentials and so on, and to fight these threats organizations need rigid security measures. They need to keep in mind that a zero trust framework cannot be implemented without a secure tool for remote access. Zero trust has many benefits when combined with remote access. It can help organizations cut back on complexity, reduce its attack surface, and increase visibility for auditing and compliance. There are a few best practices when configuring remote access within a zero trust framework like strict authentication rules, restrict authorization and auditing. The zero trust architecture is similar to one-toone segmentation and helps in preventing DDoS attack, server scanning, application exploits, man-in-the-middle attacks and SQL injection. It is all the more important now to have a network security model that verifies the user for the organization at every step of the way and all the time. With the combination of remote access and zero trust, organizations find an answer to the security concerns during the pandemic times.  

Read More

Milestone Systems Announces Thomas Jensen as New Ceo

After an extensive search for the right candidate for the CEO position at Milestone Systems, the Board of Directors is delighted to announce that Thomas Jensen has accepted the role. With his background in Hewlett-Packard and most recently in Europe’s largest IT integrator company Bechtle, Thomas Jensen is an executive leader with a strong global footprint that includes P&L responsibility for international businesses in software and hardware. He has deep business experience with IT and technology, and an understanding for the dynamics of business communities, technology partners and integrators. People are at the core of Thomas Jensen’s leadership philosophy, which resonates well with Milestone Systems’ Scandinavian leadership values and People First approach to management. Thomas Jensen said, “I am both humble and very proud to become part of Milestone Systems. Their strong focus on people was crucial to me when I accepted the position and I’m determined to continue with this as CEO. Combine this with Milestone Systems’ influence in transforming how video technology is used, both in security and in new applications beyond the industry, makes this a dream job for me.” Milestone is a strong company with a strong leadership team. Adding Thomas’ broad experience in strategy and execution puts us in a great position to achieve our goal of long-term sustainable growth for our community partners and for Milestone Systems   Thomas Jensen will join Milestone from Bechtle, Europe’s largest B2B IT service provider, where he was Executive Vice President and member of the Management Board. Before this, he was Head of Worldwide Channel Sales Strategy for HP Inc. in Palo Alto, California, United States, where he drove the global channel development. During the separation of Hewlett-Packard into HP Inc. and Hewlett-Packard Enterprise, Thomas led the channel separation, and was responsible for preparing the new strategy and organization for the indirect revenue of HP Inc. Before moving to the United States, Thomas was General Manager for Hewlett-Packard’s PC & Print Division in Denmark. Thomas Jensen has also held leadership positions in Vestas Wind Systems and Maersk Line. He holds a Master of Science in International Business Administration from the University of Aalborg and has completed the Executive Board Program at INSEAD in France. Milestone Systems is a leading provider of open platform video management software; technology that helps the world see how to ensure safety, protect assets and increase business efficiency. Milestone enables an open platform community that drives collaboration and innovation in the development and use of network video technology, with reliable and scalable solutions that are proven in more than 500,000 installations worldwide. Founded in 1998, Milestone is a stand-alone company in the Canon Group.  

Read More

A Safety Working Day With LANXESS

Monday morning in the office. Fabian starts his working day as usual by booting up his computer and in the meantime he’s preparing a latte in the coffee kitchen. As a municipal administrative employee Fabian works in the city hall of his hometown. All public buildings have particularly high fire safety requirements. But Fabian doesn’t think about that at all; he feels completely safe at his workplace. Various elements play an important role in building fire protection. Many details are specified in building regulations. Apart from the building design, which determines the escape routes, it is mainly the type of materials used and the use of fire detectors and sprinkler systems. The fire behaviour of numerous building materials is optimised by the targeted addition of flame retardants. These ensure that the materials are initially less flammable, and in the event of a fire, further slow down the spread of the fire. The choice of the appropriate flame retardant depends on the type of material and its use within the building. Fortunately, our LANXESS flame retardant experts have the necessary know-how to provide safe solutions. For example, the various insulating foams used in the construction industry are supplemented with the appropriate flame retardant products from LANXESS, such as Levagard® or Emerald Innovation® 3000. Equipment safely connected Fabian does not work alone in the city hall, of course, but together with numerous colleagues. Accordingly, many electronic devices are in continuous use here for many hours of the day. Therefore, not only are the building materials in a public building subject to strict fire protection regulations, but the electronics must also be safe. After all, cables, plugs and housings of computers, printers, copiers and more are exposed to the highest stress in everyday office life. How safe these devices are in terms of fire protection is already decided when the basic materials are put together. So it’s all the better if the right LANXESS flame retardants are added to these different products. Plugs, cables and electrical and electronic housings are made of different plastics – polyamides, polyesters, PVC and other polymers or rubber. Products from our Firemaster® or Uniplex series ensure operational reliability in the manufacture of connectors, as do Disflamoll® or Reofos® in cable production. As highly effective flame retardants in the housings, numerous manufacturers worldwide rely on LANXESS Firemaster 2100® and BA-59P™. For Fabian, this means that he can spend his daily working hours in the office without having to think about fire safety measures – and also get a sure caffeine kick from the office coffee machine at any time. Fire protection in the floor   Today Fabian is going home a little early. His grandmother is in hospital with a broken leg, and he wants to visit her quickly before dinner is served. In clinics and hospitals, safety is of course the top priority. This also includes fire protection as an extremely important safety aspect in the building. One focus is also on what is under the feet of patients, doctors, nurses, caregivers and visitors – the floor coverings. Here in the hospital, it is not only the robustness against mechanical stress that counts, but above all the resistance against fire and heat. Typical requirements for the materials of floor coverings are low flammability, slow flame spread in case of fire and low smoke density development. In order to gain valuable rescue seconds for all persons in an emergency and to secure escape routes as well as possible, highly effective LANXESS flame retardants such as Disflamoll® or Reofos® are added to the floor coverings. And Fabian and his grandmother? The two of them don’t even notice all the protective additives in the flooring, because they fulfill their safety mission in secret. So Grandma Grete is simply happy about the visit of her grandson – and Fabian is happy that he made it to his grandmother’s hospital as planned before dinner time. Every second counts So that people like Fabian can rightly place their trust in the modern products of our time, we at LANXESS are working systematically on safe and sustainable material solutions. Preventing and suppressing fires therefore plays a crucial role in material development. That’s why our research and development teams work every day to ensure compliance with strict fire safety standards in order to reduce the harmful effects of fires on people, property and the environment as far as possible in advance. This is because flame retardants are not only intended to prevent fires from starting, but also to slow down the spread of fire in the event of a fire. This creates saving seconds or minutes for escape from the danger zone and the deployment of auxiliary personnel. Such a time window can make all the difference in saving lives. We offer one of the world’s most comprehensive ranges of flame retardants and our development, consulting and sales teams support manufacturers in a wide range of product areas. LANXESS is a leading specialty chemicals company with sales of EUR 6.8 billion in 2019. The company currently has about 14,300 employees in 33 countries. The core business of LANXESS is the development, manufacturing and marketing of chemical intermediates, additives, specialty chemicals and plastics. LANXESS is listed in the leading sustainability indices Dow Jones Sustainability Index (DJSI World and Europe) and FTSE4 Good.  

Read More

How SMBs Security Benefits from Thermal Cameras?

  Some technologies that seem to be very common now were first used in military fields – such as radar, GPS, and others. However, over time, the technology matured and products can now be put into mass production, resulting in significant cost reductions and making military technology more widely used in general civilian applications. Thermal technology is another example, and possibly the most exciting right now. Here’s why. Thermal technology works on the principle that objects above the absolute zero (-273°C) emit some amount of thermal radiation, or heat. Due to varying intensities of heat radiation, people, animals, and even inanimate objects can be clearly observed using thermal technology, even in the absence of light. Thermal technology has long been used in the field of security, especially in complex environments such as border protection, forest fire detection, airport security, and so on. This imaging technology remains unaffected by visual impediments such as fog or mist and so offers a unique type of performance in harsh conditions. While thermal technology is fairly well known, experience with thermal cameras is not so common. Users often mistakenly believe that they are only installed in large and expensive projects as they are almost always associated with high-end PTZ cameras. In recent years, with the rapid development of thermal detector technology, coupled with the popularization of the use of thermal products in the application side, the cost of using thermal technology has dropped sharply. So, can thermal cameras be used in small and medium business markets, or even home security? Rethinking thermal cameras For SMBs users, preventing intrusion is one of the most important measures in protecting property. Business owners and operators are usually more focused on alarm accuracy and the ability of a security system to monitor after business hours, most commonly at night. Some core areas such as the power room in an office building have high standards for security requirements. Conventional CCTV systems can cater to the needs of surveillance during the day, but at night, criminals can still quietly approach and damage power facilities under cover of darkness, suspending normal operations. Additionally, increased operating costs due to false alarms is also a hot item for SMBs. The most common false alarms are caused by small animals and falling leaves. Here, thermal equipment is already making life easier for many users. Thermal cameras integrated with deep learning algorithms can classify people and vehicles, alerting security staff only when these two objects enter the monitoring area to reduce false alarms. Therefore, thermal cameras, free from special lighting requirements, can and should be applied in a wider variety of scenarios since they can easily do the job needed. They have strong environmental adaptability and can bolster perimeter protection with high accuracy detection in unpredictable lighting or bad weather. Furthermore, with the implementation of GDPR guidelines, thermal cameras are also increasingly being used in residential communities. According to regulations in residential perimeter protection scenarios, cameras with visible light channels are not allowed to capture images in local neighborhoods due to privacy risks over personal data. Fortunately, the ‘fuzzy’ video rendered by thermal imaging does not violate privacy issues while guaranteeing high-quality detection. Prama Hikvision: Affordable prices, consistent performance With breakthroughs in imaging, algorithms, and intelligent applications, Prama Hikvision has introduced a new affordable thermal camera, which is designed for perimeter protection and fire prevention. This thermal camera is specifically designed for short-range monitoring – up to 70 meters – so they are really best-suited for perimeter protection in SMB markets such as residential areas, office buildings, and factories. When a target enters the surveillance range, an automatic alert can be triggered to inform security personnel – a process unaffected by light or weather conditions. Most importantly, this thermal camera series opens up new opportunities for SMB users, both in terms of affordable prices and outstanding performance.  

Read More

Smart Cities: Cloud Video for Connected Secure Cities

The primary objective for smart city initiatives is to intelligently use data and technology to make everyday life easier and better for the people who live in, work in and visit the city – while making innovative and efficient use of resources. Public safety plays an important role. This is why most smart city initiatives include video surveillance for key public areas, to achieve quicker alerting and better data to inform first responders regarding accidents, crimes and public safety situations. However, if smart city initiatives take traditional approaches for physical security technology, they will undermine their primary smart city objective. Over a decade of smart city initiatives has revealed what it takes for smart city technology deployments to achieve the sustainable quality of life transformations they intend, in the face of the challenges that smart city tech projects face. Recent successes have shown that cloud-based solutions are indispensable elements of smart city infrastructure, which includes both public and private infrastructure elements. Cloud-based deployments are essential for cost-effectiveness, scalability, and short deployment time frames. Furthermore, smart city security technology projects have new technical requirements – some of which can only be met using cloud technology. This paper examines those requirements and points to two very recent projects that exemplify the kinds of success that can be achieved. Smart Cities In June 2018, the McKinsey Global Institute released an in-depth independent research and analysis report titled, ‘Smart cities: Digital solutions for a more livable future.’ McKinsey’s research identified 60 data-driven smart city applications spanning the eight domains listed below. Eleven of these applications are physical security applications. Smart Applications Successful smart city security initiatives require more than just getting city planners and stakeholders, and their security integrators and consultants, on the ‘same page.’ They must all get on a ‘new page’ that includes: Expanded system design thinking. Up to date set of technology capabilities. Active stakeholder and citizen involvement. All are required for smart city deployment success. The Smart City Context The requirements for security technology deployments derive from the ways that smart city deployments differ from traditional security system deployments. The intelligence and operational capabilities of smart cities technology infrastructure resides in three layers identified by McKinsey analysis – technology base, applications interaction, and user base. This is the context for smart city security tech deployments. Technology Base Smart city security devices and systems are part of a larger city technology base connected by reliable high-speed communications networks. Achieving reliable high-speed internet access is always the first step in smart city development – unless it already exists. Applications Interact Applications are the tools by which a smart city turns raw data into alerts, insights and action – automating as much of the job as possible. Smart city security application design must consider that application data should not just facilitate public safety operations but must also contribute to the city’s greater understanding of itself. This is plain to see in Mexico City’s recent smart city security initiative. Public Usage The size of a smart city’s user base is the most significant difference from traditional security systems, which typically range from a few dozen to a few hundred users. Smart city citizen apps include personal security and safety features and have many thousands to millions of users. These mobile apps are the way smart cities enable citizens and visitors to interact with city services, including real-time services such as parking, public transportation, security and emergency services. This is an area where security technology and service providers can be innovative in providing value for citizen end-users as well as for city operations. Key Technology Requirements Smart city technology initiatives include 11 key requirements that have been traditional weak areas for physical security technology deployments: Intelligent connectivity. Simple scalability. Device and system interoperability. Open systems architecture. Systems integration interfaces. Privacy. Cybersecurity Data governance. Actionable data and analytics. Fault-tolerance. Future-readiness. The security industry has begun improving in some of these areas. However, physical security technology has typically lagged five to 10 years behind the state of information technology and related IT practices, and exponential technology advancement has made catching up an even greater challenge. Modern Technology is Required For large-scale smart city projects it’s not possible, for both technical and cost reasons, to adequately address most or all these 11 requirements with traditional on-premises devices and systems. However, well-engineered cloudbased systems with cloud-managed field devices make it both technically possible and financially feasible to fulfill smart city key requirements. These key requirements are well understood in the IT industry, but only recently has physical security technology advanced to the point where meeting all of them is feasible in smartcity security deployments. Intelligent Connectivity Smart city networks are, for the most part, very large shared networks – both wired and wireless. That means devices and applications that use significant bandwidth – such as security video – must not only use data stream reduction techniques such as compression and recording on motion and alarm, they must also be aware of LAN and internet bandwidth availability, and intelligently buffer transmissions as needed to throttle back their usage during times of peak overall network utilization. Develop a sound networking plan for any proposed project, verifying the infrastructure capabilities and documenting the planned intelligent use of existing network infrastructure and any new infrastructure to be added. Simple Scalability On-premises systems have fixed capacities for compute, memory, disk storage and networking. Well-engineered true cloud systems can scale those resources up or down on demand. NIST defines cloud computing as “a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (for example, networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.” A true cloud application – not just a client-server system hosted in the cloud – supports cloud-managed local devices and maximally automates their management. Automation includes performing system-wide firmware upgrades and digital certificate issuance. Well-designed cloud-based systems and tools can enable large-scale…

Read More

COVID 19: Aftermath, Paradigm Shift & Framework of Active Steps for Corporate Governance

A thought leader and an action catalyzer rolled into one – Anil Puri is a rare combination of a visionary, and one who has mastered the art of strategic and tactical thinking to the core. He has been using this combination to seed new ideas and to lead them to their implementation onground. This has been a consistent feature of his career. He has been keenly watching the wide spread disruption caused by COVID 19 across the board in all contours of the industry. The spontaneous and immediate impact was on the organizations, HR & employees. Corporate governance is a mechanism which has key roles for board of directors and the management. The functional relationship between them is a bond tied with the thin wire of corporate culture, mutual understanding and regulatory guidelines. COVID 19 has transformed this space to usher in more transparency and obliterate the opaque side of the management. In this series of five articles so far, he has attempted to discuss the impact of COVID 19 over organizations with reference to roles of HR, people, processes, technology and corporate governance, and will be closing the series.   INTRODUCTION COVID-19 has created unique and very profound challenges. During the COVID-19 pandemic, with organizations facing high-stakes, high speed decision making, the need for good governance and risk management practices has never been felt greater. Just as boards and senior executives settled into new, enhanced governance processes, their operating environments have abruptly changed with COVID-19. The COVID-19 catastrophe has not only posed an unprecedented governance challenge, it has also ushered in a period of great experimentation, a time for boards both to question old habits and imagine new possibilities – from creative approaches to maintaining effective communication in virtual boardrooms to establish new ties with external peers, from diving into operational minutiae to preparing for long-term survival, and from managing financial details to ensuring that the employees are healthy and safe. The global perspective In light of the fast changing environment, globally across the spectrum of industries and sectors, it is emerging that the management and boards of directors should continually review their practices to ensure that they are right and relevant for the current environment, and that they are not sowing the seeds of future conduct issues. Elements of good governance and risk management practices are critical for organizations to undertake in order to flourish post COVID-19. Organizations that get this right will flourish post COVID-19, while poor governance could prove to be fatal. The paradigm shift The key highlights of the paradigm shift happening globally can best be summarized as under:- Boards are going virtual and managing the challenges of remote work.  The board chair is in the spotlight.  The lines between the board and management have blurred. Boards are taking the long view & putting people first. Sharing learning’s in real-time A crisis-ready board has a plan and the right people in place. Liquidity and capitalization considerations are being taken care of pro-actively Executive compensation matters are a concern. Take over defenses and preparedness are prominently figuring in the minds of the directors and managements. What constitutes the good governance and risk management practices? Both the private and public sectors are re-defining what constitutes good practice. Navigating the COVID-19 crisis requires careful consideration of a range of issues underlined in the opening sentence under these unprecedented circumstances. This article outlines several corporate governance issues for the board of directors which is charged with overseeing the short-term and long-term health of the corporation and its business prospects to consider as their companies respond to the challenges and risks posed by the COVID-19 pandemic. The balancing act for boards has suddenly become more complex as there are many significant short term impacts arising from the longer-term objectives being pursued by the board of directors and the managements. Some of the constituents of the good governance and risk management practices are listed below:- Maintain appropriate board and sub-committee oversight.  Maintain an appropriate risk appetite, risk framework and metrics. Ensure risk information is of high quality and flows freely.  Adopt an approach to regular, in the moment, self-assessments and review. Communicate clearly on purpose, values and culture. Active steps for Corporate Governance In light of director oversight responsibilities and as a matter of good corporate governance, some specific active steps for boards to consider in response to COVID-19 include the following: Enhancing the company’s existing reporting and information systems that are used by the board to provide oversight. Such a system would help ensure that the board is able to receive relevant information in a timely manner to monitor COVID-19 issues and their potential risks to and effects on the company. Once a system is implemented, a board should be active in its monitoring of significant issues so that it stays informed of material business risks and red flags resulting from the COVID-19 pandemic. Forming a committee. A possible tool available to a board to address its monitoring and oversight responsibilities is to create a committee that could be tasked with evaluating and, if necessary, adopting any available preventative and ameliorative measures regarding the impact of COVID-19 on the company’s operations and affairs. Timely and sufficiently detailed minutes and resolutions should document the proceedings of the committee and provide evidence of the activities conducted, matters considered and decisions made by the committee. If, after due consideration, the committee declines to adopt any measure considered, clear, contemporaneous committee records would then be used to support a showing of good faith in the committee’s efforts to evaluate such measure. Enhancing communications with company management. A board should consider increased and sustained open dialogue with company management on both the business risks and the workplace health and safety issues posed by COVID-19. Boards and management should review legal and regulatory developments regarding COVID-19 at both the federal and state levels, review the company’s risk-mitigation policies and protocols and adjust such protocols as necessary to conform to developing regulatory circumstances (especially if a…

Read More

Going Digital: The Benefits of Specifying The Video Surveillance at the CAD Stage

With the rapid technological developments around us, more and more industries embrace digitization. For example, the Internet of Things, automation, virtual and augmented reality, and machine learning take production and business processes to the next step. However, the engineering & construction industry (E&C) – with 13 percent of global GDP the largest in the world – has been notably reluctant to adopt new and digital technology. Disruption of the construction industry But there is a wind of change as building projects get more and more complex. Digital technology is increasingly used to create smart buildings and smart cities. The development is snowballing and already disrupting the E&C industry. New players are introducing digital business models. Change is also driven by the public sector, which sees massive advantages of adopting digital technology, such as 4D and 5D building information modeling (BIM).   BIM, defined as “a digital representation of physical and functional characteristics of a facility,” can be used to manage the information during a construction project. It covers every component of a building and the process from design to operation and maintenance to end-of-life. It improves collaboration across projects as well as efficiency, which reduces time, costs, and errors. The use of BIM models can lower error sources by 60 percent and speed up the communication flow by 50 percent. Small wonder that large organizations and governments are starting to demand the use of BIM, including Finland and the UK. The big German railway company Deutsche Bahn has introduced the use of 5D BIM solutions. Getting the right software 5D BIM brings together design (3D), time management (4D), and budget (5D). With the addition of 6D and 7D, environmental and sustainability, and life-cycle management aspects are also included. To reap the benefits of BIM, you need software that can handle the information about a building or structure. One leading software is Autodesk® Revit®, which is used by architects, structural engineers, MEP (mechanical, electrical, and plumbing) engineers as well as designers and contractors. Configuration tutorial: Axis plugin for Autodesk® Revit® – How to select cameras One of the benefits of Revit is the possibility of analyzing and simulating systems and constructions and creating 3D visualization models. The building blocks of these models are BIM objects, which are digital descriptions of products and materials and can cover practically everything you could imagine. And it is here that Axis enters the picture. Plugin for superior video surveillance The Axis camera family plugin for Revit is a goldmine for anyone who wants to add cameras or other surveillance products when planning entire IP video surveillance systems directly in a building plan. You can download it for free from axis.com, and start downloading cameras and other Axis BIM objects from your preferred BIM library. Explaining why Axis has made these BIM objects available, Mikael Flygh, globally responsible for the Axis Architects & Engineers program, says: “It’s about innovation and understanding our partners. The objective is to simplify and help them be more efficient. Our plugin and the BIM objects let them see how the video surveillance will work, already at the drawing stage.” Experience the final solution Flygh continues: “The 3D animations let you see how the cameras fit into the general architecture. Not only will it create better safety and security solutions; you – and the end-customer – can also experience the final product, which is important.” All Axis cameras are available as realistic 3D BIM objects. Using the selector tool embedded in the plugin, you can quickly choose a suitable camera. Downloaded to your building plan, you get valuable information about the cameras, such as focal range and resolution. You can adjust focal length, pan-tilt-zoom, and other settings. You can experience a 3D view, as seen through the camera lens. It is also easy to change and get the right mounting. When you are satisfied with the camera placement, it is easy to verify the entire solution’s camera coverage. Continuous improvements Axis plugin for AutoDesk® Revit® has been around for some years, but “During the last 12 months, we’ve committed to updating it, listening to and acting on customer feedback,” says Flygh. The improvements will continue, and Axis will add new products to the BIM libraries, and new features upon their release. For example, the plan is to introduce multi-sensor cameras during the third quarter of 2020. It involves the entire value chain, reducing errors and misunderstandings, improving efficiency and communication. “We will continue to invest in this because we believe in digitization,” Flygh says. “It involves the entire value chain, reducing errors and misunderstandings, improving efficiency and communication, but above all, it’s about the end-customer experience.” Covering various needs Axis offers several tools that will help you during the planning and design phase. One example is a plugin for Trimble® Sketchup® that provides 3D CAD models that let you find the right camera and visualize its coverage.  

Read More

Protecting Identity in the Age of Privacy

With great advances in video and access control technology – including mobile capabilities, cloud efficiencies, analytics and biometrics – security providers are aiming to create the most secure and seamless credentials, all during a time when privacy concerns seem to be dictating public opinion and impacting security. The increase in use of these technologies brings with it a growth in the volume of data. This article looks at the following areas of focus in privacy considerations: Definitions of privacy. Legalities of privacy and compliance (in the U.S.). Education on privacy. Definitions and ethical use of facial recognition. The biometric debate. Can we have both security and convenience? Definitions of privacy The description for privacy in Merriam-Webster’s dictionary is – “freedom from unauthorized intrusion.” From a legal point of view, privacy is defined as a person’s right to control access to his or her personal information. In today’s data-driven world, privacy issues are raised in the context of government collection or distribution of personal information, as well as corporate use of personally identifiable information (PII). PII is any data that could potentially be used to identify a particular person. Examples include a full name, social security number, driver’s license number, bank account number, passport number and email address. Photo or video data also comes into play, as well as biometric data. Legalities of privacy Milestone Systems is a global video management software company based out of Copenhagen, Denmark, that has had a focus since 2017 on the General Data Protection Regulations (GDPR) that went into force in Europe in May 2018. They define the individual’s critical privacy matters to be protected as ‘sensitive personal data’ such as your racial/ ethnic origin, genetic and biometric info, health and financial data, religious, political and sexual preferences. GDPR has a focus on these key principles: Lawfulness. Fairness and transparency. Legitimate purpose’ limitations on the gathering, use, sharing and storage of sensitive personal data, and its minimization. Milestone has investigated every facet of business from products to business practices, to ensure compliance and provide guidance to employees, partners and customers. In the U.S., three states led the way in 2019 enacting biometric privacy laws – Illinois, Texas and Washington. The California Consumer Privacy Act (CCPA) took effect in January 2020. Then multiple states proposed similar legislation to protect consumers. Arizona, Florida, and Massachusetts introduced legislation addressing biometric privacy, on the heels of a decision for the Illinois Biometric Information Privacy Act. The best way for security dealers, integrators and consultants to learn each state’s biometric laws and work within their parameters is to keep informed. To stay abreast of the changing state-privacy landscape, the IAPP Westin Research Center compiled a list of proposed comprehensive privacy bills from across the country. The updated version of this tool, including a new state law tracker map, exists on the IAPP Resource Center, here. It is advised to take a multi-path approach to stay informed from the many points of view: Join local chapters of SIA and ASIS to network with other professionals specific to your region. Partner with the manufacturers and developers of the technologies you are interested in; they will know how their solutions fit state and local legislation. Get involved with local law enforcement groups, attend relevant presentations on new local and state ordinances. Follow and support organizations like the IAPP which is the world’s largest and most comprehensive global information privacy community. Be vigilant for compliance Ensuring compliance with GDPR and similar data privacy laws requires high organizational maturity with careful planning and preparation of video surveillance and other security systems, including the policies and procedures regulating how the technology is used. To help system integrators and end users design, implement and operate video surveillance systems that are compliant with such privacy regulations, Milestone provides a holistic set of tools, including privacy guides, best practices and training resources to build privacy awareness. If you go to the Milestone website and search for GDPR, you’ll find 1,450 references. There’s a lot of useful information available. Education on privacy and cybersecurity The entire market needs to be educated on what’s being done with people’s sensitive information. Milestone carries out GDPR webinars that are mandatory for staff – as we have also done with cybersecurity training (both internally and externally for our partners) which is related when trying to preserve data privacy, access or sharing. Regarding cybersecurity hackers and our partners’ work with IT systems, current knowledge and best practices help to keep people’s sensitive information safe. Double authentication is becoming standard for managing access to company systems and websites. Data encryption is also key to the lockdown of information and its history of creation, access, user logs etc. Regular software updates with the newest version releases are also best practice to ensure against cyber trouble. At Milestone, we have a comprehensive system hardening guide online. It details the top five most effective cybersecurity strategies to focus on when combating cyberattacks: Isolate the device network from other networks. Educate employees about security threats. Use Active Directory for user and computer management. Enable encryption at every stage necessary. Separate the VMS server and client networks from the company’s business network. Ethics of facial recognition Advanced facial recognition technology has benefited Americans in countless under-publicized ways, helping to do many critical things, for example: find missing children, fight human trafficking, secure borders from drug trade, identify dangerous criminals, bring sexual predators to justice and thwart identity thieves. There is a difference between facial detection vs. facial recognition. Facial detection is a broader term and means that a system is able to identify that there is a human face present in an image or video. Facial recognition can confirm identity and thereby be used to control access to sensitive areas. Authentication/ verification helps verify a person is who they claim to be. The system checks a submitted photo against an existing template to verify that it is the same person – one-to-one (1:1) matching. This configuration is applicable to banking,…

Read More