securitylinkindia

Resurgence of Tape Backup in the Digital Era

Nikhil Korgaonkar, Regional Director, Arcserve India & SAARC Most people today will consider reels of tape to be as dated as steam engine and analog cameras, having been replaced by newer, faster, and more efficient technologies. Unfortunately, one can still see many stories around reporting the death of tape storage, citing technology drawbacks as a significant reason. Such as, tapes can be labor-intensive, requiring a manual process to change them at the beginning or end of every day. Tapes are long and stringy, and can also be misplaced or outright lost. These factors and more have given tape storage a poor reputation in today’s marketplace, and they are helping to drive the steady migration to flash storage and cloud storage. But here’s the thing. Despite all the criticism and naysaying, tape has survived and is in fact more relevant today than ever as a means of data storage. With 5G adoptions and the dramatic expansion of the internet of things (IoT), the amount of data being generated is more than what can be stored easily. As of January 2021, there were 4.66 billion active internet users worldwide, accounting for 59.5 percent of the global population. By 2025, there will be 38.6 billion IoT-connected devices worldwide. One can only imagine what will be the size of data generated by 38+ billion objects! Storing such massive amounts of data on the cloud can be expensive, especially if all of it is not urgent or mission-critical. And nothing comes close to storing voluminous data on tapes. Besides, storage cost is very little per gigabyte. Tape is like the mainframe computer, which allegedly died more than 20 years ago but is still a tried-and-true technology in many large enterprises. Tape capacity shipments are on the upswing. A recent report from the Tape Storage Council found that a record 114,079 PB of linear tape-open (LTO) tape capacity shipped in 2019. That’s about 400% more than was shipped in 2009. Here are five reasons why tape storage offers significant advantages over other options. 1. Tape boasts better protection against ransomware Many of today’s data-storage technologies such as cloud storage, can’t fully protect the organization against the growing threat of ransomware attacks. On the other hand, tape backup is offline, so it can’t be easily infiltrated by malware or any other kind of cyberattack. The tapes themselves are often kept at offsite locations or in storage vaults. That means tape can serve as the last line of defense. Even if ransomware thieves penetrate all the other defenses, they still won’t be able to score if all the data is safely backed up on tape. So, it’s ironic that while we become more and more connected and digitized, we rely on good old tape to give us an extra layer of protection and better secure our data against ransomware. Tape offers other security capabilities as well, such as write-once-read-many (WORM), which means that data once written can never be overwritten or deleted, either unintentionally or by those who wish to do the harm. This capability is critical because it’s not just outside hackers who pose a threat. Sometimes insiders are the problem. If a disgruntled employee tries to delete all the data, having tape storage can completely negate that threat. 2.Tape can survive disasters Even after all these years, backing up data on tape and sending it offsite is still a highly reliable disaster recovery method. If the office burns down or there’s a once-in-a-century flood or any other kind of natural disaster, the safest way of protecting the data is to put it on tape in a secure remote location. That’s why savvy organizations will never stop doing tape storage. 3.Tape is cost-effective The cost of tape storage continues to decrease while its storage capacity increases. Tape remains one of the least expensive options for longterm data archiving. According to Fujifilm, tape is three to four times cheaper to use than disk for long-term storage. The leading tape backup format is LTO, and with the introduction of LTO-8 several years ago, enterprises can store up to 30TB of data compressed on a single tape. But that’s just the beginning. In the not-too-distant future, LTO-generation-12 will store up to 480TB compressed on one tape. That means tape can easily accommodate the massive data growth that almost every organization faces. 4.Tape makes insurers happy Cyber liability insurance is a type of insurance designed to cover losses and penalties associated with a data breach or other cyberattack. But large insurance providers are getting very selective when underwriting new cyber policies. Many will only insure customers that have ironclad data-protection strategies. That means businesses must increase their investments in security tools and processes to prove that they are a worthwhile risk to insurance providers. Having an A-to-Z strategy that includes disk storage, cloud storage, and tape storage gives a better risk profile in the eyes of cyber insurance providers. Need more benefits? Ask the insurance company if they will reduce the premiums since the data is backed up to tape. Better still, companies with an end-to-end security strategy that includes backup & recovery and storage may not even need cyber insurance. If companies have three different storage media at their disposal, they can protect themselves in pretty much any potential data-loss scenario. 5.Tape lasts much longer Data storage professionals have a saying. There are two types of hard disks: those that have failed and those that will fail. Yes, modern-day technologies like magnetic storage, flash storage, and cloud storage offer a lot in performance and flexibility. But they fall far short of tape storage when it comes to shelf life. They don’t even come close. Tape storage has an average lifespan of 30 years. Disk storage, by contrast, typically starts to fail after about five years. Right now, tape storage is the only medium that will preserve data well into the future. Tape may be one of the oldest methods for data storage, but it remains highly relevant for backup…

Read More

The Convergence of Physical and IT Security – and What it Means for Your Business

“The age of IoT and AI means that physical and IT security are no longer separate domains. Instead, everything is connected, and you need to converge your security leadership, teams, capabilities, and technologies to navigate the evolving risk landscape ~ Fred Streefland, Director of Cybersecurity and Privacy at Hikvision EMEA” Until recently, physical and cybersecurity domains were separate from one another. Security teams, access control systems, and CCTV systems were used to physically secure buildings – from data centers to factories and warehouses. And IT teams looked after IT and network security with firewalls, anti-virus software, and data encryption technologies. But as organizations have forged ahead on their digital transformation journeys, innovative technologies such as IoT and AI have blurred the lines between physical security and cybersecurity: a trend that’s set to continue long term. Why IoT is increasing your physical and IT ‘attack surface’ When thinking about your overall security strategy, consider that your security cameras and other security infrastructure are now ‘IoT devices’ that are connected to the network. This gives criminals and hackers a much larger ‘attack surface’ for their activities, with multiple ways into your organization. For example, hacking or otherwise accessing a network-connected camera or other device can allow criminals to override physical security controls and enter restricted areas or buildings. Equally, hackers who can breach IoT devices on the network may be able to disrupt critical systems, steal data, install ransomware, or otherwise compromise your company’s operations. Physical break-ins also pose major cybersecurity risks Equally, criminals who manage to circumvent your physical security infrastructure can also gain access to IT equipment and systems housed in restricted buildings. This means they can extend the impact of their localized attack across the length and breadth of your network, causing untold damage and disruption in the process. This is especially the case where server rooms are left open or unlocked within a building. The mission-criticality of the network, and the sensitive data stored in connected systems, means that much stronger security is needed for these kinds of facilities to ensure they are never accessed, even if intruders breach your building defenses. Here are some examples of how physical threat vectors can compromise digital security: An infected USB drive is planted in a parking lot, lobby, etc., which an employee picks up and loads onto the corporate network. An attacker breaks into a server room and installs a rogue device that captures confidential data. An attacker pretends to be an employee and counts on a real employee’s courtesy to hold the door for him as they enter together. An inside actor looks over the shoulder of a system engineer as they type administrative credentials into a system. The most well-known example of an attack on physical systems followed by an attack of IT systems is the hack on the retail giant Target in 2013. The attackers used an HVAC vendor’s credentials to compromise the network and ultimately the point of sale (PoS) systems of this company. The attackers ‘entered’ the company via the Heating, Ventilation & Air Conditioning (HVAC) systems and managed to compromise several millions of credit cards of Target customers, which caused the resignation of the CIO and CEO of Target. Why ignoring the issue isn’t an option The consequences of security breaches – whether they take place in the physical or IT domain – are potentially devastating for many organizations, and especially those in mission-critical industries. Security breaches at electricity sub-stations, for example, could leave entire towns or cities without power. And similar breaches in data centers could result in internet ‘blackouts,’ major data breaches, regulatory fines, and a raft of other negative impacts. To minimize the risks of security breaches in the age of IoT, forward-thinking organizations are looking to extend their security strategies seamlessly across the physical and IT domains. This holistic and integrated approach requires both organizational and technology changes that reflect the rapidly changing physical and IT security risk landscape. 4 key strategies for integrating your physical and IT security Forward-thinking organizations are beginning to integrate their physical and IT security provision based on 4 key strategies: Creating an integrated security culture and transformation plan: Any successful integration of physical and IT security begins with a strategy based on digital transformation. This strategy needs to be communicated across the entire security organization from the top down, preparing teams for the transition to integrated physical and cybersecurity, including key milestones and potential disruptions and change management issues. Appointing a CISO or data officer who is responsible for both physical and IT security: The siloed nature of physical and IT security responsibilities increases the risk that attacks in a particular domain will go undetected, or that responses will be too slow to prevent negative impacts from occurring. By appointing a CISO or other c-level executive for joint responsibility, and visibility, of physical and IT security, these potential gaps can be closed, and faster, more effective responses can be mounted in the event of a breach in either domain. Converging physical and IT security monitoring within a single dashboard interface: In terms of technology, integrating IT and physical security monitoring into a single dashboard helps to dramatically decrease the risk of a breach, and to mitigate the impacts if a breach should occur. For example, by mapping cyber and physical threats together, a unified dashboard can spot anomalies more quickly, and pinpoint where the threat originated based on an unidentified device in the network, unauthorized access to a device or physical space, or other threat indicators. Deploying innovative technologies that enable truly unified security responses: By implementing data analytics platforms, smart video solutions, AI-powered security algorithms and other innovative technologies of this type, organizations can detect security threats across physical and IT domains in near-real time. Additionally, false positives can be minimized, further saving time and resources and speeding up security responses. How Hikvision can help At Hikvision, we provide smart video technologies and AI-powered security algorithms that help to improve security in…

Read More

Eagle Eye Networks Showcases Advantages of Cloud Video Surveillance at Lab for Coworking and Coliving in Spain

Eagle Eye Networks, the global company in cloud video surveillance, has partnered with access control provider SALTO Systems to showcase its cloud video surveillance capabilities at the coworking and coliving facilities of La Pinada Lab in Valencia, Spain. This cooperation is designed to expand the ways video surveillance is used in coworking and coliving spaces. In addition to security, video surveillance can foster collaboration and deliver insights into building usage and how visitors interact with the property. Eagle Eye Networks installed a cloud video surveillance system at La Pinada Lab to demonstrate the value of sharing video and the system’s easeof-use. In 2022, Eagle Eye Networks and select technology partners will offer courses to professionals who work in the smart cities and smart buildings field. The Eagle Eye Networks integration with SALTO cloud access control is a powerful example of the role that integrated security will play in providing holistic security and insights into buildings. “We are excited to contribute to the La Pinada Lab initiative in Spain to foster innovation and collaboration,” said Rishi Lodhia, Managing Director, Eagle Eye Networks EMEA, “Our ecosystem of technology partners help expand the possibilities of our own products and services, making them even more useful for our customers. After moving to Eagle Eye Networks, the City of Elche, Spain has reduced the number of employees needed for camera monitoring and maintenance, while city officials are gaining more insights from the cameras. In La Pinada Lab we go one step further to not only show the advantages of cloud video surveillance but how cloud video surveillance and cloud access control create an integrated security solution. Employees are able to focus on creativity, customer experience and innovation, the Eagle Eye Networks platform, with cloud access control from SALTO, provides ease-of-use and does the heavy lifting of maintaining the system.” Christian Schmitz, Vertical Lead for Shared Living and Work Spaces at SALTO Systems, said the solution gives La Pinada Lab the ability “to connect the dots between lifestyle and technology, allowing them to build the right tech infrastructure.” SALTO and Eagle Eye Networks are joining La Pinada Lab’s partnership program as Project Partners. The first step is to incorporate both SALTO smart access products and technology and Eagle Eye Networks cloud video surveillance into the infrastructure of the La Pinada space, Schmitz said, “And being installed in a lab, it is only natural to observe and experiment with the use of Eagle Eye technology and SALTO’s keyless experience, identifying opportunities for new solutions and the impact of digitization and automation on daily life.” Miguel Tito Malone, Director of La Pinada Lab said, “A space like this only comes to life if you have the right partners in the ecosystem that want to drive collaboration and innovation. To have two state-of-the art global partners like SALTO and Eagle Eye Networks is a real asset. They are leading the transformation of physical security, showing how cloud security is an important element of the building experience. Together with Eagle Eye Networks and SALTO we are able to deliver on our promise to foster collaboration in contemporary building design and usage.” Fernando Fernandez of TGT Consulting is the Eagle Eye Networks certified reseller who did the installation at La Pinada Lab. He said, “This was one of my first installations of the Eagle Eye Cloud VMS (video management system) product and I am truly impressed with its capabilities and flexibility. Now I am able to offer my clients a broader range of services, from telecommunications to physical security as a service.”  

Read More

IDIS Video Showcases its Complete Line up of Ndaa-Compliant end-to-end Surveillance Solutions

In its latest tech round-up video, IDIS highlights its complete line up of NDAA-compliant cameras and recorders. Featuring HD and UHD network cameras, plus powerful NVR and enterprise-class PC servers that connect seamlessly to a choice of VMS. IDIS’s end-to-end, NDAA-compliant solutions are now being chosen for a growing list of European projects in sectors ranging from education, retail, hotels, data centres, and commercial office space. The updated IDIS camera lineup, designed for a wide range of settings and environments, includes a range of 2MP, 5MP, and 8MP domes, bullets, and turret cameras, plus the company’s best-selling and award-winning 5MP and 12MP IR Super Fisheyes. The new NDAA-compliant models come with IR, true WDR, IDIS smart failover, alarm in/ out, and two-way audio and vandal resistance options. New NDAA-compliant recording enabled with 16- to 32-channel network recorders (NVRs), featuring built-in PoE switches, incoming throughput of up to 370Mbps, and allow 960ips UHD real-time recording. Or large and multi-site users can choose PC severs that come pre-installed with IDIS Solution Suite VMS and support up to 256 Full HD cameras in real-time. With redundant power and equipped with RAID 5 & 6, they offer mission-critical reliability and feature a two rack-mount chassis for easy maintenance and options for sliding rails and cable management. Both the NVRs and PC servers are powered by Intel chipsets, and support H.264/ H.265 dual codec, allowing users to utilise existing monitors, making premature screen, smartphone, or tablet upgrades unnecessary. All IDIS equipment is backed by extended warranties and benefit from IDIS DirectIP® plug-andplay technology, enabling easy and fast installation, streamlined cybersecurity, and simple maintenance and firmware updates. Customers can choose to seamlessly connect to the costfree IDIS Center VMS for applications encompassing up to 1,024 devices or the enterprise-class and modular IDIS Solution Suite to manage an unlimited number of sites and devices. The flexible end-to-end solution, combined with forward and backward compatibility, results in a compelling low total cost of ownership (TCO). U.S. President Joe Biden recently signed the Secure Equipment Act of 2021, which requires the Federal Communications Commission (FCC) to establish rules stating that it will no longer review or approve any authorisation application for equipment that is on the list of covered communications or services. “The IDIS NDAA-compliant range follows the rules imposed by the U.S. government,” said James Min, Managing Director, IDIS Europe, “All IDIS products are designed and manufactured in South Korea, bringing the reassurance needed for enterprises that have businesses in the US or plan to enter the market in the future.”  

Read More

NIST Updates FIPS 201 Personal Identity Credential Standard

To ensure that federal employees have a broader set of modern options for accessing facilities and electronic resources, the National Institute of Standards and Technology (NIST) has increased the number of acceptable types of credentials that federal agencies can permit as official digital identity. The increase is part of the latest update to Federal Information Processing Standard (FIPS) 201, which specifies the credentials that can be used by federal employees and contractors to access federal sites. The update, formally titled FIPS 201-3: Personal Identity Verification (PIV) of Federal Employees and Contractors, also allows for remote identity proofing and issuing, in addition to doing so in-person as was previously required. “We have expanded the set of credentials that can be used for gaining access to federal facilities and also for logging onto workstations and other IT resources,” said Hildegard Ferraiolo, a NIST Computer Scientist, “It’s not all about PIV cards anymore.” The preceding FIPS standard, version 201-2, came out in 2013 and specified credentials embedded on PIV cards as the primary means for authentication with limited exceptions for credentials designed for mobile devices that lacked PIV card readers. Millions of PIV cards have been issued to federal employees. The 201-3 update, the result of a regular review cycle, still specifies that PIV cards can be used but now offers additional options. It keeps the standard aligned with the most recent federal policies, including the Office of Management and Budget’s Memorandum M-19-17 on identity, credential and access management. It also ensures that the standard reflects current technological capabilities and needs, Ferraiolo said. “It has become important to provide more flexibility to agencies in choosing credentials to use for authentication,” she said, “Not all laptop computers are available with built-in PIV card slots, for example, and often, there are cloud-based applications that don’t use public-key infrastructure that PIV cards provide. For these situations we need alternatives.” The new options are a subset of credentials that are specified in NIST SP 800-63-3, a multivolume publication on digital identity. Branches of the government will have a richer set of multifactor credentials for different devices – including, for example, FIDO (Fast ID Online) tokens and one-time passwords (OTP). With the revision milestone now complete, the focus for NIST has shifted to providing additional guidelines and implementation details, Ferraiolo said. NIST is currently in the process of updating guidelines for the expanded set of PIV credentials in Revision 1 of NIST SP 800-157. Additionally, to ensure that different credentials are interoperable across different agencies, a concept known as ‘federation,’ NIST will provide guidelines in NIST SP 800-217. Ferraiolo said these and other NIST publications associated with FIPS 201-3 would be updated in coming months.  

Read More

Every Door is an Opportunity

Nikhil Kothary, Founder & CEO of VAMS Global We are in the midst of the third wave and the numbers are shooting up. In the last 24 hours, 2.64 lakh new cases were reported in India and the first fortnight of 2022 has seen close to 17 crore new cases globally. Omicron cases are expected to rise in the next few days given the variant’s higher transmission rates. But there is good news Vaccinations have allayed fears in the country over the last six months and will continue to fulfill their purpose. As of January 14, 157 crore vaccines were reported to have been administered in India and an average of 84 lakhs were being administered per day over the last 2 weeks of the third wave. Third wave agenda: Aarogya Setu & CoWIN checks To practice caution, many workplaces are at half capacity, with employees coming in only on certain days of the week. Workforces are either alternating between work-fromhome and work-from-office or completely transitioning to remote work for a temporary period. Employers naturally will have to stay aware of the people coming to and from their workplaces. Health status is such an important piece of information going forward. Cross-checking governmental databases for RT-PCR test results and vaccination statuses can always help. Employers might want to request their employees/ visitors for this information and perhaps enforce rules to ensure that the people passing through their doors are, at the very least, double-dosed. To this purpose, vaccination status apps and web portals like Aarogya Setu and CoWIN can assist employers in their bid to create a safe environment. How can they do this? Human resources departments can organize one process by which this information can be seamlessly offered by employees and visitors. This best practice would be to have a Co-WIN and Aarogya Setu integrated workflow management system. Letting the right people in, not keeping the wrong people out A workflow management system simplifies the entry process for all visitors/ employees in the workplace and it also simplifies the administrative functions of workplace managers and human resources. It can be a lot of things at one time. It can be a data collection process that ethically stores names, in-times, out-times, and purposes of the visitors. It can be a security-related process that integrates with access control technology like biometrics, turnstiles, facial recognition scanners, and more. It can be a workplace experience management process that helps visitors make appointments. And it can be a health check process that can integrate with Aarogya Setu and CoWIN apps to ensure the favorable health status of visitors and employees coming in. An integrated workflow management system does not discriminate against the ‘wrong people.’ It is a software that helps the right people come in, the people who are healthy – your industrious employees, managers, clients, maintenance staff, and contractors. It gives you the opportunity, as human resources heads and workplace managers, to objectively assess and manage the flow of people in the workplace. It allows no health-related discrepancies and betters the workplace experience for everyone who is involved in contributing to the company. Every door is an opportunity for you to show your employees and visitors that you care about more than just what they can give you, as they come into the workplace. With an workflow management system integrated with CoWIN and Aarogya Setu like VAMS, you show that you care about the optimal conditions for their health.  

Read More

The India Outstanding Security Performance Awards (OSPAs) What Makes Them Different?

Martin Gill, Founder of the OSPAs In December 2022 the second India Outstanding Security Performance Awards (OSPAs) took place, virtually because of Covid. The awards ceremony brought together all the leading security associations in India and recognised those who have excelled in different areas of security work. The OSPAs are global, currently in 15 countries and expanding. What makes them different to any other security awards scheme on the planet? The OSPAs do not just recognise outstanding security companies and individuals (at different levels from director to those working on the frontline), they also recognise security teams, initiatives and products. The awards are based on strict ethical principles with a transparent process to create a level playing field. For example, all the judges are nominated by the security associations; they all agree to mark to an ethics policy; they have to declare any conflict of interest on every mark sheet. This is the same globally. “The awards started in Norway, then to Germany and Australia, and is now in 15 countries; this year will see the addition of Canada, France, Ireland and New Zealand – these awards are truly global. In due course the winners of every category in every country will compete for a global OSPAs, that is our vision” The awards started in Norway, then to Germany and Australia, and is now in 15 countries; this year will see the addition of Canada, France, Ireland and New Zealand – these awards are truly global. In due course the winners of every category in every country will compete for a global OSPAs, that is our vision. There are a variety of categories, the same in every country, all based on research which was designed to distinguish those who are excellent from those who are merely good. The criteria are published for the world to see. They cover many diverse areas of security recognising that security professionals work in many different sectors conducting a range of important activities that need and merit being highlighted. Increasingly, around the world, people are looking at the winners of the OSPAs as example setters; after all, to win an OSPA is an achievement, there is a more rigorous process than is normal with awards which makes being a finalist and a winner all the more rewarding. This is important, as a sector we need to recognise who is excellent and who is making a difference; that is a key route to progress. Moreover, for too often competent security professionals and the organisations they work for and the teams they work with, have operated under the radar. As a consequence the true value of security remains under appreciated. In organisations the role of security is rarely understood for the true value it brings; the OSPAs are a part of the process bringing about a change. In India, working with our event partners, Business World, we are already planning the 2022 OSPAs. It promises to be bigger than every before. We hope the event will be a physical event this year, a gala occasion recognising the very best security has to offer. And because the OSPAs are global, it is not just Indian security professionals who will be watching, the OSPAs will be a window to the world. We already know the very best of India security is excellent, we just need to tell more people about it.  

Read More

Top 8 Trends: for the Security Industry in 2022

Ashish P. Dhakan MD & CEO, Prama Hikvision India Pvt. Ltd. Entering 2022, the world continues to endure the pandemic. But the security industry has, no doubt, continued to shift, adapt, and develop in spite of things. Several trends have even accelerated. Beyond traditional ‘physical security,’ a host of frontiers like AI, cloud computing, IoT, and cybersecurity are being rapidly pioneered by entities big and small in our industry. By all appearances, the security industry is in a stage of redefining itself. It is moving from mere security and safety protections to encompass a wider scope of activity that will expand safety while also bringing new levels of intelligence and sustainability to communities, companies and societies. Here, Hikvision would like to share some of our ideas and expectations about the key trends that will likely affect the security industry in 2022 and perhaps even further into the future. AI will be everywhere Nowadays, Artificial Intelligence is quite common in the security industry. More customers in the industry have recognized the value of AI, and have found new uses for AI applications in various scenarios. Along with ANPR, automated event alerts, and false alarm reduction, AI technologies are being used for wider applications, like personal protective equipment (PPE) detection, fall detection for the elderly, mine surface detection, and much more. Meanwhile, we also have seen more collaboration across the industry, with security manufacturers opening their hardware products to third-party AI applications, and launching open platforms for customers to create and train their own AI algorithms to meet customized needs. AI has been one of the fundamental technologies to reshape the security industry. Benefiting from the optimization of algorithms, as well as the improved computing performance and the decreased cost of chips due to the advancement of semiconductor technology in recent years, AI applications are gradually forming the basic functions and capabilities accepted by all sectors in the industry, and we predict an even stronger tendency to assert that ‘AI will be everywhere.’ AIoT will digitize and pervade industry verticals With more security cameras and other security devices being connected to the network, the security industry is becoming an important part of an IoT world, enriching its visual capabilities. It’s apparent that the boundaries of the security industry are blurring, going well beyond the physical security arena. Meanwhile the popularization of AI technology enables the connected devices to become intelligent ‘things’ in the IoT world. The combination of AI and IoT, or as we call it, AIoT, is taking the security industry to a higher plain, automating the workflows and procedures of enterprises and aiding in the digital transformation of various industry verticals such as energy, logistics, manufacturing, retail, education, healthcare etc. From our perspective, AIoT brings more possibilities to the industry with rapidly expanding applications for security devices and systems. Meanwhile, more perception capabilities like radar, Lidar, temperature measuring, humidity sensing, and gas leak detection are being added to security devices and systems to make them more powerful. These new devices shoulder a multiplicity of tasks that just a few years ago required several different devices, covering both security functions and other intelligent functions for an ever-advancing world. Converged systems will break down data silos Workers throughout private enterprises and public service sectors alike would jump at the chance to get rid of obstructive ‘data silos.’ Data and information scattered and isolated in disparate systems or groups creates barriers to information sharing and collaboration, preventing managers from getting a holistic view of their operations. Here, the convergence of various information systems has been proven to be an effective approach – hopefully enough to break down those silos. It’s clear – the trend in the security industry has been to make efforts to converge systems wherever possible, including video, access control, alarms, fire prevention, and emergency management, to name a few. Further, more non-security systems, like human resources, finance, inventory, and logistics systems are also converging onto unified management platforms to increase collaboration and to support management in better decision-making based on more comprehensive data and analytics. Cloud-based solutions and services will be essential Like AI, the cloud is not a new trend in our industry, but it is an expanding one. From small business markets to enterprise levels, we can see the momentum push more and more businesses to leverage cloud-based security solutions and services. And as we are witnessing even now, the pandemic has accelerated the movement to cloud-based operations for people and businesses around the world. All businesses want platforms or services that offer simplicity, with as few assets to manage as possible, and a setup that’s as simple as possible. This is precisely where the cloud delivers. With a cloud-hosting infrastructure, there is no need for a local server or software. Users can conveniently check the status of their assets and businesses in real time, receive security events and alarms quickly, and accomplish emergency responses simply using a mobile app. For security business operators, the cloud enables them to remotely help their clients, configure devices, fix bugs, maintain and upgrade security systems, and provide better value-added services. Crystal clear security imaging will be standard in any weather, under any conditions, any time of day or night It is always vital for video security cameras, as a core function to maintain image clarity and capture details 24 hours a day, in any weather and under any condition. Cameras with low light imaging technology that renders high-definition and full-color images at night and in nearly completely dark environments have been very welcome in the market. We are taking note of the impressive technology applied to more camera models, including 4K, Varifocal and PTZ cameras. Moreover, for clearer video security imaging in poor visibility – especially in severe weather – high-performance imaging sensors, ISP technology, and AI algorithms are being employed, enabling cameras to maintain clarity and details of the view. Speaking of imaging technology, the trend toward incorporating multiple lenses in new cameras cannot be ignored. Single-lens cameras are…

Read More

Another Major Win for Smart Building Application

Background In its efforts to expand into vertical markets, Delta Electronics commissioned global leading IP surveillance provider, VIVOTEK, to create a comprehensive smart IP surveillance solution for its new Chungli Plant in Taiwan. Using a series of network cameras centrally managed by an online image management system and processed using AI-based image analysis software, the solution can issue instantaneous in-plant alerts while providing images of targeted areas in real-time, allowing for rapid response and ensuring an ideal work environment. VIVOTEK’s smart IP surveillance solution not only creates a safer workplace but also dramatically Enhances operation efficiency. Its real-time visualization of the target scope once again demonstrates VIVOTEK’s superiority in soft and hard power integration. Challenge To alleviate inter-building, inter-floor, and inter-site surveillance pain points, VIVOTEK designed a custom smart IP surveillance solution for Chungli Plant targeting six major areas – production line, logistics area, storage area, exterior wall, access points, and management center. The network cameras are centrally managed by an image management system, allowing for instant alerts in various situations, including fires, equipment abnormalities, items left on the operating floor, intrusion, and perimeter breach. The solution can also be linked to access control systems or other systems to fortify plant security, achieve LPR, or effectively manage traffic access and schedules. Footage can then be relayed back to the management center to identify and manage key data for decision-making or improving operational efficiency. Solution Over 150 VIVOTEK smart IP surveillance cameras were installed in Chungli Plant. Of which, roughly 100 were FD8166A-N indoor dome cameras, and over 50 were IB9367-H, IB9367-HT, and IB9367- EHT-v2 bullet cameras and IB9387-LPR cameras. Moreover, the VAST 2 IP video management platform was adopted to integrate VIVOTEK’s LPR Solution, Cybersecurity Management Solution, Smart VCA, and Smart Search, thereby achieving full digital transmission and system integration and bringing synergy to plant management. Result Since joining Delta, VIVOTEK has collaborated closely with its building automation business group. Delta is committed to providing complete smart building solutions, while VIVOTEK focuses on pushing the boundaries of security and applying AI, edge computing, and IoT technologies to IP surveillance equipment to achieve real-time streaming of digital data, merge physical buildings and virtual spaces, and create a mutually-beneficial smart building ecosystem. Delta’s Chungli Plant, which was completed last year, is a testament to the successful integration of Delta’s smart building framework and VIVOTEK’s security solutions. Delta’s BIM-based iBMS, winner of the 2021 AutoDesk BIM+ Innovative Application Award, links VIVOTEK’s security solutions to building electromechanical, air-conditioning, and lighting systems to greatly enhance smart monitoring and operation/maintenance efficiency.  

Read More

How the Smart City Vision has become a Reality with Milestone Video and IBM AI

Intelligent solutions are proving technology is indispensable for people safety in city life. In such places as Copenhagen, Stockholm and Denver, integrated systems raise the quality of living through reduced crime and safer transportation. In Poland, Katowice has one of the most advanced and flexible systems. In this capital city, Milestone’s video management platform centralizes monitoring, increasing security and coordinating services. Challenge: Help to scale out operations, add AI The first video cameras were installed in Katowice in 2001, when the city invested in 16 analog devices installed in the city center, sending the images to the Municipal Police Headquarters. This was the first step to building a video monitoring system to guard against dangerous events. The vision grew for new investments as a smart city, which became the KISMiA project – Katowice Intelligent Monitoring and Analysis System. By 2021, around 300 cameras spread across 160+ km2 of the city. Katowice chose an open design video platform to be able to expand the network over time. “Adding more cameras made us think how to more effectively operate using artificial intelligence. The monitoring center established in 2017 covered locations in the city center and other districts, as well as 16 family activity zones. Additionally, 10 road traffic supervision points were launched. The system can be expanded to more than 1,000 cameras” Miroslaw Cygan Head of the Crisis Management Dept. of the City Hall, KISMiA Project Coordinator When the KISMiA project was born, a fiber optic network was created connecting all city centers and many points of the city. The goals were to improve the effectiveness of the monitoring operators and city services with better coordination. The integrated system gave clearer orientation on incidents and more efficient cooperation of security support. The system was fully implemented in 2017, and now can expand monitoring in new areas, such as Park-andRide transfer centers. Solution: A 21st Century Data Center Implementing this system was possible thanks to several components. IBM’s Intelligent Operations Center software was used as an operational support module, and IBM Intelligent Video Analytics as a recorded image analysis module. The video material is handled with the Milestone XProtect Corporate video management platform to register, store, share video material and smoothly manage the cameras. “KISMiA is unique in the country, in that the system was created with the future in mind. The construction of the fiber optic network with flexible monitoring points and a unified data center was aiming for the top. Katowice has a project engineer who is technologically certified and supported by Milestone Systems. This makes it easier to develop a city strategy for years to come” Marcin Palka Dept of IT and Crisis Management The system is defined for the types of threat situations, and immediately alerts an operator. This cuts short the time it takes to respond for services or voice communications at the scene. This includes among other things: Person lying down. Left object. Animals in family activity zones (playgrounds, parks, barbecue areas etc). Crowds gathering in public spaces (critical during pandemics). Vehicle collisions. Parking in prohibited places. Driving against the traffic directional flow. Damage caused by wind or flooding. Result: Controlling danger in parks or on roads Threatening situations are detected, and operators can determine how to address an incident. An undesirable object or movement may appear in a park at dusk, for example. If it is a wild boar, the reaction will be different than dealing with people who are there after dark. Such places are also equipped with loudspeakers, which are useful if vandals invade the area. The operator’s voice deters them, and often more intervention is not necessary. “Katowice is a city of innovative solutions and implementation of new technologies; we are becoming more and more smart city in many areas. We were the first in Poland to create this intelligent video monitoring system on this scale. Undoubtedly, the modern solutions of Milestone XProtect Corporate contribute to increasing the level of security in Katowice” Marcin Krupa Mayor of Katowice The system also supports traffic control in the city. LPR (License Plate Recognition) gateways show the flow of traffic and help detect such things as runaway or stolen vehicles. The operator can also tell relevant services which direction a wayward car is going.  

Read More