securitylinkindia

LenelS2 Expands Artificial Intelligence Portfolio with Hakimo Reseller Agreement

LenelS2, the global company in advanced security systems and services, recently announced a global reseller agreement with Hakimo, a technology company dedicated to modernizing physical security through its artificial intelligence (AI) software. The agreement allows LenelS2 to offer the Hakimo solution, which integrates with LenelS2’s market-leading OnGuard® and NetBox™ access control systems, to its value-added reseller community. LenelS2 is a part of Carrier Global Corporation, the leading global provider of healthy, safe, sustainable and intelligent building and cold chain solutions. Hakimo AI software automatically prioritizes alarms based on security risk, allowing security teams to quickly respond to actual incidents and dramatically reduce door-forced-open and door-held-open nuisance alarms. The Hakimo solution also assesses access control events to uncover tailgating violations, or unauthorized access by people and vehicles, that might otherwise go undetected. Digital records of all events support personnel responding to incidents as well as compliance efforts in highly regulated sectors such as energy, critical infrastructure and aviation. Insights produced by the Hakimo solution can guide security system maintenance and help inform security programs and planning. “We are excited to announce our deepened relationship with Hakimo, which aligns with our AI product strategy and roadmap,” said Jeff Stanek, President, LenelS2, “Hakimo’s award-winning solution addresses two of the top challenges that enterprise security teams face – false alarms and tailgating.” “Hakimo’s AI solution is revolutionizing enterprise physical security monitoring,” said Samuel Joseph, Co-Founder and CEO, Hakimo, “We look forward to bringing the technology to many more security operations teams through our collaboration with LenelS2, the leading access control provider.” The bi-directional, integrated solution available through this agreement allows Hakimo AI data and alarms to display within the LenelS2 OnGuard and NetBox dashboards, enabling customers with the ability to enjoy single-source access control alarm management. Enterprise security end users can activate this immersive solution through their LenelS2 value-added resellers. Earlier this year, the Hakimo solution won the Security Industry Association (SIA) New Products and Solutions Judges’ Choice award at ISC West. LenelS2 is the global company in advanced physical security solutions, including access control, video surveillance and mobile credentialing. Our technology includes web-based and mobile applications enhanced by cloud-based services. Incorporating open architecture, LenelS2 provides scalable, unified security management solutions to customers ranging from global enterprises to small- and mid-size organizations. Easy to install and use, LenelS2 products are supported by an experienced, responsive team dedicated to providing exceptional service. LenelS2 serves segments worldwide including corporate, education, healthcare and government. LenelS2 is a part of Carrier Global Corporation, the leading global provider of healthy, safe, sustainable and intelligent building and cold chain solutions.  

Read More

STMicroelectronics achieves EMVCo certification for biometric-payment platform, cutting time-to-market for card issuers

STMicroelectronics, a global semiconductor company serving customers across the spectrum of electronics applications, has announced it has completed EMVCo1 certification for its STPay-Topaz-Bio biometric payment card platform. Certification confirms the security of the platform and its interoperability with payment systems. Mastercard and Visa payment schemes certifications are expected by early 2023. The achievement makes STPay-Topaz-Bio and the underlying secure hardware the first one-stop-shop EMVCo-certified platform to comprise a biometric secure element and secure operating system (OS). The market for biometric payment cards is forecasted to grow at over 200% CAGR through 2026. “Card issuers everywhere can now take advantage of our certified STPay platform to deliver new products to market quickly, protected by biometric authentication that is extremely robust as well as easy to use,” said Laurent Degauque, Marketing Director, Secure Microcontroller Division, STMicroelectronics, “The secure element IC that anchors this solution leverages our expertise in hardware security for computing and Internet-of-Things (IoT) applications and is built for contact and contactless transactions.” ST’s ST31N600 secure element IC provides state-of-the-art defenses for card-payment applications and sensitive processes. These include the biometric template matching for cardholder authentication, which uses software libraries developed with Fingerprint Cards AB (Fingerprints™). The ST31N600 runs a secure OS and the latest Arm® SecurCore® architecture for secure microcontrollers. In addition, designers can introduce value-added card features by securely connecting various types of peripherals. Co-packaged with ST’s STM32L443 ultra-low-power general-purpose microcontroller in a module compliant with EMV® specifications, STPay-Topaz-Bio delivers a cost-effective Biometric System-on-Card (BSoC) solution. The STM32L443 handles non-sensitive aspects including managing the card’s fingerprint sensor module and ensures seamless experiences for users. Also featuring energy harvesting for batteryless operation, STPay-Topaz-Bio meets EMV ISO 7816, ISO 14443, standards for contact and contactless cards.  

Read More

Cyber-Enabled Financial Crime: USD130 Million Intercepted in Global INTERPOL Police Operation

An INTERPOL police operation to tackle online fraud has seen almost 1000 suspects arrested and the seizure of USD129,975,440 worth of virtual assets. Fraud investigators around the world worked together over five months (28 June – 23 November) to intercept money and virtual assets linked to a wide range of cyber-enabled financial crimes and money laundering, assisting countries to recover and return illicitly obtained funds to victims. Specifically targeting voice phishing, romance scams, sextortion, investment fraud and money laundering associated with illegal online gambling, Operation HAECHI III was coordinated by INTERPOL’s Financial Crime and Anti-Corruption Centre (IFCACC) which supported 30 countries via their respective INTERPOL National Central Bureaus (NCBs). In total, the operation resulted in the arrest of 975 individuals and allowed investigators to resolve more than 1,600 cases. In addition almost 2,800 bank and virtual-asset accounts linked to the illicit proceeds of online financial crime were blocked. Operation HAECHI III investigations generated the publication of 95 INTERPOL Notices and diffusions, and the detection of 16 new crime trends. Taking the profit out of financial crime Operation HAECHI III brought together law enforcement agencies, Financial Intelligence Units, asset recovery offices, prosecutors and private sector financial experts to identify illicit funds and money mules, detect money laundering activities and deactivate associated bank accounts. “The success of this operation is based on two key elements for law enforcement, follow the money and cooperation via INTERPOL. We have highlighted the need for greater efforts to deprive criminals of their illegal gains and this operation has seen member countries doing just that,” INTERPOL Secretary General, Jürgen Stock. International police cooperation during Operation HAECHI III unveiled several emerging online financial crime trends, particularly variations on impersonation scams, romance frauds, sextortion and investment frauds. Investigators also reported a surge in fraudulent investment schemes committed through the use of instant messaging apps where encrypted information is exchanged promoting the use of cryptocurrency wallets for payment. In one investigation, two Red Notice fugitives wanted by Korea for suspected involvement in a global Ponzi scheme were arrested in Greece and Italy after embezzling EUR28 million from 2,000 Korean victims. In another case, the Austrian and Indian NCBs identified a group of online criminals who had been impersonating INTERPOL officers, persuading victims to transfer some USD159,000 through financial institutions, cryptocurrency exchanges and online gift cards. Indian authorities raided the call centre, seizing four cryptocurrency wallets and other crucial crime evidence. “As we look to the future, we recognize the importance for decisive and concerted law enforcement action across borders. This year’s leg of Operation HAECHI III speaks volumes of IFCACC’s dedicated coordination and the strong commitment of participating countries, all of which foretell of new law enforcement victories ahead,” said Hyung Se Lee, Head of NCB Seoul. From test pilot to live policing tool: ARRP After several months of pilot testing, Operation HAECHI III saw investigators launch INTERPOL’s new global stop-payment mechanism, known as the Anti-Money Laundering Rapid Response Protocol (ARRP), which enables countries to work together to submit and handle requests to restrain criminal proceeds. Among many ARRP successes during the operation, NCBs Manchester and Dublin worked together to trace and seize some EUR1.2 million lost to business email scams perpetrated in Ireland. The funds were returned in full to the victim’s Irish bank account, and investigations continue. Since January 2022, in total the ARRP has helped member countries recover more than USD120 million in criminal proceeds from cyber-enabled fraud. HAECHI III participating countries: Australia, Austria, Brunei, Cambodia, Cote d’Ivoire, France, Ghana, Hong-Kong (China), India, Indonesia, Ireland, Japan, Korea, Kyrgyzstan, Laos, Malaysia, Maldives, Nigeria, Philippines, Poland, Romania, Singapore, Slovenia, South Africa, Spain, Sweden, Thailand, United Arab Emirates, United Kingdom, United States. The HAECHI III Operation is global in scope, conducted under the aegis of a three-year project to tackle cyberenabled financial crime supported by the Republic of Korea, with the participation of INTERPOL member countries on every continent.  

Read More

What does Responsible use of AI in Businesses Mean Today?

Artificial Intelligence is no longer just a cliched topic in the entertainment world. AI today has developed into a ‘must-have’ for every vertical from the government to basic applications on our gadgets. The use and dependency of AI especially in businesses have increased multifold, be it for understanding the customers or developing new products to suit the needs of the users. While the use of AI is opening up never-seen-before opportunities and possibilities for organizations across verticals, it also brings in incredible responsibility to safeguard the data and ensure transparency. Ethics seem to play a bigger part in ensuring that organizations take up a responsible path in using AI for their businesses. Data breaches, irresponsible use of the data collected and its processing using AI, and irresponsible use of AI to an extent of violating ethics have become the main concern for the people, government and businesses. A brand’s image is now connected to how responsibly they use AI which is at its disposal without breaching the trust of its customers. In February 2021, NITI Aayog released an approach document on ‘Principles for Responsible AI’ under the hashtag #AIFORALL. The document spoke about ethics, legal, social and technology, surrounding AI. While the Indian government is slowly approaching the subject, keeping in mind the need for AI and its impact on business, society and legal standpoint, the US and EU nations too have started working now on how to bring the responsible use of AI as part of the governance. Until there is an actual policy, which can be brought in regarding the responsible use of AI, the onus is on industry leaders and their organizations to ensure the safe and responsible use of AI in their businesses. So, what is responsible AI in businesses mean? F rench writer Voltaire said – with great power comes great responsibility, and AI is a power which many believe is only in its 1st leg of being discovered. The understand ing of what can be achieved by delving deeper into AI is only something that is being understood now. The veterans of the AI industry believe that ‘responsible’ means ethical and democratized use of AI – a tool, which is now available to any person, who has access to the technology. To elaborate, it is the practice of designing, developing and deploying AI with the intention to empower employees and businesses. Responsible AI’s target is to deliver trust, transparency and an unbiased approach to customers or users in the work environment. Organizations deploying AI should follow important practices and the right AI techniques that are compliant with new and pending guidelines and regulations of AI governance. This will help to deliver a trustworthy and transparent deployment. One might ask, why is AI needed for businesses when the risks and ethical dilemmas outweigh the uses as of today? The answer is simple – with AI, businesses have an edge in developing more robust and user-friendly products that help them stay a step ahead of their competition. The data collected helps businesses understand what exactly their customers are looking for and how they can deliver it. Today’s customer service is heavily dependent on AI and good customer service is what makes a brand successful. These are just a few instances of how AI can help businesses stay ahead during times when technology is the knight in shining armour. This is why one needs to understand the principles of Responsible AI that revolve around minimizing unintended bias, ensuring AI transparency, protecting data privacy and security, and benefiting clients and markets. Organizations deploying AI systems should keep these in mind and put them into practice to attain the desired deployment which is more ethical in compliance with Responsible AI. An eye on the following key facts for reaping the benefits of Responsible AI Data security has been and should be the top priority, so organizations deploying AI should use top-of-the-line data encryption practices. Use approved techniques such as customer lockboxes and data masking to protect the data from unauthorized access by other software. The AI-based products should have a human-centric design and once it is developed and deployed, they should go through regular operational routines for maintaining the whole idea of it being designed to be human-centric. The AI system should be developed to anonymize sensitive data of clientele and automatically delete the data after the purpose is fulfilled. Restricted data transfers between different stakeholders It is very important to put in place an explicit approval system for data access during service operations. A good amount of incident management training and Strict data usage policies can help in times of crises. Keep a check on risks and threats by performing regular audits and vulnerability assessments. Considering the above factors during AI system deployment will not only help in addressing the principles of Responsible AI but also help businesses develop ethically bound AI applications for their work operations.  

Read More

The 6 Technology Trends Affecting the Security Sector in 2023

By Johan Paulsson, CTO, Axis Communications The fact that technology has become pervasive in our personal and work lives is not news. This is largely due to the benefits that new technologies bring to business and citizens around the world in delivering new, more effective, and increasingly efficient services. However, the depth of technology’s integration into our lives, advances in its capabilities, and heightened awareness of its implications in society are also greater than ever and continue to accelerate. Given this, many of the broad macro trends around the globe – spanning geopolitical issues, economic uncertainty, environmental concerns, and human rights – have implications for all technology sectors, the security industry included. Ours is a sector making use of increasingly intelligent technology, one inherently involved in collecting sensitive data, and as impacted by geopolitical issues affecting international trade as any. Yet we’re still resolute in our view that our innovations will create a smarter, safer world. These are the six key technology trends that we believe will affect the security sector in 2023. A move towards actionable insights The increasing application of AI and machine learning have seen a focus on the opportunity for advanced analytics in recent years. Moving forward, the shift in focus will move from the analytics themselves, to the actionable insights they deliver in specific use cases. It’s less about telling you something is wrong, and more about helping you decide what action to take. A key driver for employing analytics to deliver actionable insights is the huge increase in data being generated by surveillance cameras, along with other sensors integrated into a solution. The data (and metadata) being created would be impossible for human operators to interpret and act upon quickly enough, even with huge and costly increases in resources. The use of analytics can drive real-time actions which support safety, security, and operational efficiency. From prompts to call emergency services in the case of incidents, to redirecting traffic in cities to alleviate jams, to redeploying staff in busy retail outlets, to saving energy in buildings through more efficient lighting and heating, analytics are recommending, prompting, and even starting to take the actions that support human operators. Beyond ‘live’ actionable insights, analytics can support in forensic analysis post-incident. Again, given the vast amount of data being created by surveillance cameras, finding the relevant views of a scene can take significant time. This can hinder investigations and reduce the likelihood of suspects being found. Assisted search addresses this issue, helping operators quickly find individuals and objects of interest among hours of footage. Finally, proposed actions promoted by analytics are increasingly forward-looking. Downtime in industrial sites and factories can be costly. A combination of sensors allows intelligent analytics to propose preventative maintenance ahead of outright failure. ‘From analytics to action’ will become a mantra for 2023. Use case-defined hybrid architectures As we’ve highlighted in previous technology trends posts, it’s now commonly accepted that a hybrid technology architecture is best-suited for security systems, mixing on-premise servers, cloud-based compute, and powerful edge devices. No one architecture fits all scenarios, however. But here lies the solution – first assess what needs to be addressed in your specific use case, and then define the hybrid solution that will meet your needs. A number of factors need to be considered. Undoubtedly the advantages of advanced analytics embedded in surveillance cameras on the edge of the network are clear to see. Analysis of the highest-quality images the instant they are captured gives organizations the best chance to react in real-time. Equally, the data generated by surveillance cameras is now useful beyond the real-time view. Analysis of trends over time can deliver insights leading to operational efficiencies. This analysis often demands the processing power found in on-premise servers or the cloud. And of course, there are the requirements – often defined by regulation – around data privacy and storage that vary from country-to-country and region-to-region. These can define the difference between on-premise storage and the use of the cloud. What’s essential is not to tie yourself to a single architecture. Remain open, give yourself the flexibility to create the hybrid architecture best suited to your specific needs. The emergence of cybersecurity sub-trends The importance of cybersecurity is also highlighted through the requirement to remain compliant. For instance, the proposed European Commission’s Cyber Resilience Act will place greater demands on producers of hardware and software across all sectors to ensure the cybersecurity of their products, through fewer vulnerabilities at launch, and better cybersecurity management throughout the products’ lifecycles. The security and surveillance sector will, of course, be included. The Act demonstrates both the importance and the complexity of cybersecurity. No longer can it be seen as one subject, but rather several interlinked areas. Some of these are well established, but others are emerging. In the video surveillance sector, cybersecurity measures that ensure the authenticity and safety of data as it is captured and transferred from camera to cloud to server will be essential to maintain trust in its value. We will see a more proactive approach by technology vendors in identifying vulnerabilities, with ‘bug bounty’ programs becoming commonplace to incentivize external parties. And customers will expect transparency regarding the cybersecurity of security solutions, with a Software Bill of Materials becoming standard in assessing software security and risk management. Beyond security One of the most significant trends for the security sector, and with it an equally-significant opportunity, is the move beyond security. Surveillance cameras have become powerful sensors. The quality of video information they capture, in all conditions, has increased year-on-year for decades. Today, through advanced analytics, they also create metadata – information about the video data – which adds another layer of information and value. This of course improves and enhances their ability to support safety and operational efficiency use cases in addition to security. The opportunity now exists to combine the data created by surveillance cameras with that from other sensors – monitoring temperature, noise, air and water quality, vibration, weather, and more…

Read More

Protecting the Piazza Lucio Dalla

The Piazza Lucio Dalla in the Comune di Bologna is a covered square of 5,882 square metres that has recently been restored and inaugurated in Summer 2022. Named after Bolognese singer-songwriter, musician and actor Lucio Dalla, the space will become the new ‘Piazza Grande’ for Bologna, according to Matteo Lepore, mayor of Bologna. The square hosts a range of events and entertainment for people of all ages, including concerts, theatre performances, street food and children’s workshops. The new space is also a meeting point that can be used in all weathers thanks to the canopy designed by architect Renato Bernardi in the 1950s. A durable security system As part of the restoration, the city authorities realised the need for a video surveillance system that could monitor the square in all conditions, morning and night. Wisenet Q Series PTZ cameras were chosen due to their reputation for durability and robustness, the image quality delivered and the complete integration with the monitoring system already in use in the control rooms. The cameras are installed across the square, with pan, tilt, and zoom cameras chosen to move easily across the square when investigating an event or tracking a person of interest. The cameras provide up to 23x optical zoom, with IR LED to monitor images clearly in low light conditions. They can identify objects up to 100 metres away in Full HR resolution. Intelligence built-in The cameras also come with built-in analytics, including motion detection, directional detection, virtual line, enter/ exit, and tampering, to allow more accurate control by the authorities and the operators. The system integrates with Genetec Security Center Video Analysis, and video feeds are monitored by the local police operational centre. Future innovation Comune di Bologna is currently undergoing a digital transformation as part of the local Digital Agenda. “It was important that we implemented the right technology as part of the restoration of Piazza Lucio Dall. The Wisenet cameras play an important role in keeping people using the busy piazza safe and secure, but also integrate with other systems, including Genetec’s, to improve collaboration across departments and agencies. It also gives us greater options for exploring future integrations – as the Settore innovazione digitale e dati initiative includes IoT and 5G technologies,” explained Ing. Alberto Nuzzo, Head of Office ‘Digital Infrastructure’ presso Comune di Bologna.  

Read More

Old Spaghetti Factory Restaurants Choose Interface to Modernize Network, Voice, and Physical Security

Interface Systems, a leading managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, recently announced that The Old Spaghetti Factory (OSF), a family-owned and operated restaurant chain with over 40 locations across 13 states, has chosen Interface’s suite of managed services to transform its network, voice and security infrastructure. Network Upgrade The OSF IT team wanted to standardize network equipment across all their locations to increase efficiencies and reduce downtime. Since implementing Interface’s restaurant-networkin-a-box, which guarantees 99% uptime and includes 4G wireless WAN failover, OSF has experienced significantly better network uptime resulting in improved employee productivity, and better guest experience. “Interface’s restaurant-networkin-a-box has allowed us to upgrade to a high-speed, secure network at all our locations and reduced the need for our employees to spend time troubleshooting network issues,” explained Travis Crownover, Director of IT at The Old Spaghetti Factory. Physical security OSF’s legacy alarm systems were complex to manage and maintain. To improve security, Interface deployed a managed alarm solution. The new solution includes a mobile application that enables OSF employees to arm or disarm alarm systems via smartphones, and easily manage alarm systems at any location they are deployed to without additional training. The managed alarm solution has streamlined security operations and reduced operating costs. “By making the switch to Interface for intrusion monitoring, we realized a cost savings of at least 30%,” said Crownover, “Our restaurants rely on our IT department and Interface has really helped us take a lot of the workload off of our own IT team.” Replacing an outdated phone system OSF’s aging phone systems made operations difficult due to poor call quality and a lack of flexibility when systems failed. OSF chose to replace their phone system with Interface’s business VoIP solution. “Interface’s phone system gives us improved call quality and the auto-attendant feature allows us to handle customer calls at scale,” said Crownover.  

Read More