securitylinkindia

The 6 Technology Trends Affecting the Security Sector in 2023

By Johan Paulsson, CTO, Axis Communications The fact that technology has become pervasive in our personal and work lives is not news. This is largely due to the benefits that new technologies bring to business and citizens around the world in delivering new, more effective, and increasingly efficient services. However, the depth of technology’s integration into our lives, advances in its capabilities, and heightened awareness of its implications in society are also greater than ever and continue to accelerate. Given this, many of the broad macro trends around the globe – spanning geopolitical issues, economic uncertainty, environmental concerns, and human rights – have implications for all technology sectors, the security industry included. Ours is a sector making use of increasingly intelligent technology, one inherently involved in collecting sensitive data, and as impacted by geopolitical issues affecting international trade as any. Yet we’re still resolute in our view that our innovations will create a smarter, safer world. These are the six key technology trends that we believe will affect the security sector in 2023. A move towards actionable insights The increasing application of AI and machine learning have seen a focus on the opportunity for advanced analytics in recent years. Moving forward, the shift in focus will move from the analytics themselves, to the actionable insights they deliver in specific use cases. It’s less about telling you something is wrong, and more about helping you decide what action to take. A key driver for employing analytics to deliver actionable insights is the huge increase in data being generated by surveillance cameras, along with other sensors integrated into a solution. The data (and metadata) being created would be impossible for human operators to interpret and act upon quickly enough, even with huge and costly increases in resources. The use of analytics can drive real-time actions which support safety, security, and operational efficiency. From prompts to call emergency services in the case of incidents, to redirecting traffic in cities to alleviate jams, to redeploying staff in busy retail outlets, to saving energy in buildings through more efficient lighting and heating, analytics are recommending, prompting, and even starting to take the actions that support human operators. Beyond ‘live’ actionable insights, analytics can support in forensic analysis post-incident. Again, given the vast amount of data being created by surveillance cameras, finding the relevant views of a scene can take significant time. This can hinder investigations and reduce the likelihood of suspects being found. Assisted search addresses this issue, helping operators quickly find individuals and objects of interest among hours of footage. Finally, proposed actions promoted by analytics are increasingly forward-looking. Downtime in industrial sites and factories can be costly. A combination of sensors allows intelligent analytics to propose preventative maintenance ahead of outright failure. ‘From analytics to action’ will become a mantra for 2023. Use case-defined hybrid architectures As we’ve highlighted in previous technology trends posts, it’s now commonly accepted that a hybrid technology architecture is best-suited for security systems, mixing on-premise servers, cloud-based compute, and powerful edge devices. No one architecture fits all scenarios, however. But here lies the solution – first assess what needs to be addressed in your specific use case, and then define the hybrid solution that will meet your needs. A number of factors need to be considered. Undoubtedly the advantages of advanced analytics embedded in surveillance cameras on the edge of the network are clear to see. Analysis of the highest-quality images the instant they are captured gives organizations the best chance to react in real-time. Equally, the data generated by surveillance cameras is now useful beyond the real-time view. Analysis of trends over time can deliver insights leading to operational efficiencies. This analysis often demands the processing power found in on-premise servers or the cloud. And of course, there are the requirements – often defined by regulation – around data privacy and storage that vary from country-to-country and region-to-region. These can define the difference between on-premise storage and the use of the cloud. What’s essential is not to tie yourself to a single architecture. Remain open, give yourself the flexibility to create the hybrid architecture best suited to your specific needs. The emergence of cybersecurity sub-trends The importance of cybersecurity is also highlighted through the requirement to remain compliant. For instance, the proposed European Commission’s Cyber Resilience Act will place greater demands on producers of hardware and software across all sectors to ensure the cybersecurity of their products, through fewer vulnerabilities at launch, and better cybersecurity management throughout the products’ lifecycles. The security and surveillance sector will, of course, be included. The Act demonstrates both the importance and the complexity of cybersecurity. No longer can it be seen as one subject, but rather several interlinked areas. Some of these are well established, but others are emerging. In the video surveillance sector, cybersecurity measures that ensure the authenticity and safety of data as it is captured and transferred from camera to cloud to server will be essential to maintain trust in its value. We will see a more proactive approach by technology vendors in identifying vulnerabilities, with ‘bug bounty’ programs becoming commonplace to incentivize external parties. And customers will expect transparency regarding the cybersecurity of security solutions, with a Software Bill of Materials becoming standard in assessing software security and risk management. Beyond security One of the most significant trends for the security sector, and with it an equally-significant opportunity, is the move beyond security. Surveillance cameras have become powerful sensors. The quality of video information they capture, in all conditions, has increased year-on-year for decades. Today, through advanced analytics, they also create metadata – information about the video data – which adds another layer of information and value. This of course improves and enhances their ability to support safety and operational efficiency use cases in addition to security. The opportunity now exists to combine the data created by surveillance cameras with that from other sensors – monitoring temperature, noise, air and water quality, vibration, weather, and more…

Read More

Protecting the Piazza Lucio Dalla

The Piazza Lucio Dalla in the Comune di Bologna is a covered square of 5,882 square metres that has recently been restored and inaugurated in Summer 2022. Named after Bolognese singer-songwriter, musician and actor Lucio Dalla, the space will become the new ‘Piazza Grande’ for Bologna, according to Matteo Lepore, mayor of Bologna. The square hosts a range of events and entertainment for people of all ages, including concerts, theatre performances, street food and children’s workshops. The new space is also a meeting point that can be used in all weathers thanks to the canopy designed by architect Renato Bernardi in the 1950s. A durable security system As part of the restoration, the city authorities realised the need for a video surveillance system that could monitor the square in all conditions, morning and night. Wisenet Q Series PTZ cameras were chosen due to their reputation for durability and robustness, the image quality delivered and the complete integration with the monitoring system already in use in the control rooms. The cameras are installed across the square, with pan, tilt, and zoom cameras chosen to move easily across the square when investigating an event or tracking a person of interest. The cameras provide up to 23x optical zoom, with IR LED to monitor images clearly in low light conditions. They can identify objects up to 100 metres away in Full HR resolution. Intelligence built-in The cameras also come with built-in analytics, including motion detection, directional detection, virtual line, enter/ exit, and tampering, to allow more accurate control by the authorities and the operators. The system integrates with Genetec Security Center Video Analysis, and video feeds are monitored by the local police operational centre. Future innovation Comune di Bologna is currently undergoing a digital transformation as part of the local Digital Agenda. “It was important that we implemented the right technology as part of the restoration of Piazza Lucio Dall. The Wisenet cameras play an important role in keeping people using the busy piazza safe and secure, but also integrate with other systems, including Genetec’s, to improve collaboration across departments and agencies. It also gives us greater options for exploring future integrations – as the Settore innovazione digitale e dati initiative includes IoT and 5G technologies,” explained Ing. Alberto Nuzzo, Head of Office ‘Digital Infrastructure’ presso Comune di Bologna.  

Read More

Old Spaghetti Factory Restaurants Choose Interface to Modernize Network, Voice, and Physical Security

Interface Systems, a leading managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, recently announced that The Old Spaghetti Factory (OSF), a family-owned and operated restaurant chain with over 40 locations across 13 states, has chosen Interface’s suite of managed services to transform its network, voice and security infrastructure. Network Upgrade The OSF IT team wanted to standardize network equipment across all their locations to increase efficiencies and reduce downtime. Since implementing Interface’s restaurant-networkin-a-box, which guarantees 99% uptime and includes 4G wireless WAN failover, OSF has experienced significantly better network uptime resulting in improved employee productivity, and better guest experience. “Interface’s restaurant-networkin-a-box has allowed us to upgrade to a high-speed, secure network at all our locations and reduced the need for our employees to spend time troubleshooting network issues,” explained Travis Crownover, Director of IT at The Old Spaghetti Factory. Physical security OSF’s legacy alarm systems were complex to manage and maintain. To improve security, Interface deployed a managed alarm solution. The new solution includes a mobile application that enables OSF employees to arm or disarm alarm systems via smartphones, and easily manage alarm systems at any location they are deployed to without additional training. The managed alarm solution has streamlined security operations and reduced operating costs. “By making the switch to Interface for intrusion monitoring, we realized a cost savings of at least 30%,” said Crownover, “Our restaurants rely on our IT department and Interface has really helped us take a lot of the workload off of our own IT team.” Replacing an outdated phone system OSF’s aging phone systems made operations difficult due to poor call quality and a lack of flexibility when systems failed. OSF chose to replace their phone system with Interface’s business VoIP solution. “Interface’s phone system gives us improved call quality and the auto-attendant feature allows us to handle customer calls at scale,” said Crownover.  

Read More

For the Third Consecutive Time, HID is the Smart Ticket Producer for FIFA World Cup 2022

HID, a worldwide company in trusted identity solutions, announces it is for the third consecutive time the smart ticket producer of FIFA World Cup, one of the largest and most popular sporting events in the world. This year, HID is also providing a fully custom solution for outer-perimeter access control and all exit gates to ensure a smooth exit and facilitate emergency evacuations. Featuring eight stadiums spread across five Qatari cities, the Middle Eastern country expects more than 1.2 million visitors to attend the games, happening from November 20 to December 18. Counterfeiting is a concern of event organizers, so FIFA relied on HID to deliver approximately 2 million paper tickets manufactured with unique security features, including a Radio Frequency Identification (RFID) inlay. Unlike barcoded tickets, which can be counterfeited more easily, RFID transmits the unique identity of a ticket and ticket holder via radio waves. And because RFID scanners do not need a direct line of sight like traditional barcode scanners, ticket validation is frictionless, dramatically speeding up admissions in high-volume events such as World Cup matches. “It is exciting to see our smart ticket solutions help fuel the fan experience for one of the world’s largest and most-watched events,” said Björn Lidefelt, EVP and Head of HID, “Helping bring the world together for an event like the World Cup is what our technology is all about.” As part of the project, HID is also providing personalization solution for the secure tickets, including self-service kiosks for media seat assignment tickets, cabinets for tickets instant issuing with special printers for on-the-go ticket personalization, thousands of handheld scanners and on-site support during each match. An accompanying Event Management Platform (EMP) from HID will provide real-time data and reporting through several user-friendly dashboards, which will help security officials and event organizers to remotely monitor and manage everything from the number of attendees at each entry and exit point to media credentialing and crowd control. Novel solution with limitless potential HID was also requested to provide an outer-perimeter access control layer of security checks in each stadium and training fields across the country. To support this, hundreds of gates embed a new, patent-pending, UHF booster technology developed by HID, which serves as a companion device for common UHF readers to enhance the RFID tag reading capacity in challenging use cases. Units are integrated within the HID EMP for real-time events tracking and monitoring of the system health. Most importantly, this all happens automatically to maintain a seamless flow in and out of the gates, and ensure optimum user experience for the fans. “Having real-time data of when ticket holders are going in and out of the perimeter is crucial for event organizers to ensure the best possible experience for fans to accredited people, as well as obtain intelligence as to where a particular gate needs more attention in terms of crowd control and emergency evacuation,” explained Cesare Paciello, HID’s Vice President of Events and Mobility Solutions for Identification Technologies and head of the project.  

Read More

Hikvision’s Classroom Hub Solution Offers Convergence of Real, Digital and Virtual Classrooms

The movement toward informatization in education is continually being pursued. Also, students growing up in a technological world are eager for more immersive learning experiences and better education resources. Hikvision’s Classroom Hub stands at the forefront of this movement, extending real classrooms to digital, virtual classrooms, bridging all kinds of gaps between teaching and learning. This solution overcomes a variety of challenges by offering digital teaching, remote learning, and multi-classroom instruction. The Classroom Hub Solution empowers all educational staff to enjoy more connectivity, engagement, and learning breakthroughs using our smart teaching assistant, easy-to-use software, and collaboration of multiple applications. In-class applications Challenges In conventional classrooms, teaching tools offer limited formats for writing, illustration, and other resources, which also makes learning very challenging for the students sitting in the back row or students with other learning difficulties. Moreover, classroom-bound teachers need a whole host of tools to create lessons, including chalk, markers, a projector, chalkboard or whiteboard, pointer, and so on. ‘Teaching’ and ‘efficiency’ do not commonly go together. Hikvision’s Interactive Flat Panel presents a new kind of intelligent teaching assistant. It integrates the latest technologies in touch controls, high-definition display, video processing, network communications, interactivity, and audio features, with abundant third-party teaching resources available as well. Teachers can intuitively create digital instruction to boost the learning environment and experience, enjoying more interactivity with students. Benefits Easy wireless projection from a smartphone, iPad, PC or Mac, sharing multimedia teaching materials across multiple teaching formats With flexible white board software, users will enjoy more powerful visual experiences than with a traditional blackboard. Equipped with world-class, cutting-edge panel technologies, a great display, flexible visual aids, and better eye protection can be guaranteed. Educators can explore more possibilities with the openness to third-party applications from Window or Android. Features 150 mesh, ultra-fine sandblasting frame for an extraordinary user experience. Filters out >90% ultrashort-wave blue light to protect eyes. Supports up to 4 terminals projecting simultaneously via window splicing. Up to 20-point IR touch sensitivity so several people can use the panel display at the same time.  

Read More

A Focus on Emerging Threats: Cybersecurity Awareness Month

In 2022, cybercrime is ever-increasing, and the number of attacks and bad actors continues to increase exponentially. As soon as we’ve learned to eliminate a threat, perpetrators are creating new ways to breach networks. It can feel like a never-ending cycle. And it is no surprise because successful attacks on Medibank, the Colonial Pipeline, and SolarWinds demonstrate the significant need for cybersecurity efforts that act differently than traditional practices. A holistic approach must be defined and expanded to cover applications and workloads during runtime wherever they may reside to protect our enterprise systems better. This is the only way to ensure that the correct code and processes can execute and nothing else, regardless of the threat environment. Cybercrime’s threat to individuals and organizations leaves them feeling anxious, thinking about the possibilities that can take place without appropriate security practices or solutions. In response to this increasing threat, we as an industry must commit to being as proactive as possible by educating, training, and staying updated on security-leading practices. As you can imagine, our cybersecurity strategies have undergone immense changes over the years, and significant strides have been made by security teams across the globe. Since its introduction in October 2003, Cybersecurity Awareness Month (CSAM) has brought greater awareness to this global issue. Leaders and employees have been more aware of their role in mitigating threats, while ISOs and CISOs worldwide are now developing greater Security Education Training and Awareness (SETA) programs. The bottom line is that security knowledge should be focused on awareness for all, training employees with key roles, and educating cybersecurity specialists. SETA programs are not a one size fits all, and many now include phishing exercises, tabletop security incidents rehearsal, and simulated attacks with Red and Blue teams. The theme of this year’s CSAM campaign is ‘See Yourself in Cyber,’ demonstrating that while cybersecurity might seem complex, it is all about teamwork. ACRE recognizes that all members of an organization play a role in defending our organization’s data, assets, and employees. We also all play a part in protecting personal data in our day-to-day life. Currently, employees need to keep a mindset of security in all tasks that they complete, whether cyber or physical. Supporting this initiative is our SETA program, which is designed to promote cybersecurity awareness. Additionally, our team has developed other campaigns to enhance our employee’s overall security knowledge through workshops, assessments, and security incident scenario rehearsal to help reduce our security risks. Regarding our security solutions, ACRE strives to balance our security strategy with our core product pillars of identifying, protecting, detecting, responding, and recovering. Adhering to cybersecurity best practices, we actively train our specialists to be conscious of security and data protection in every step of the product lifecycle from the initial concept through retirement. In a world where ever-evolving technology produces incredible innovations, it raises threats more than ever before. We believe that one factor contributing to this is the risk of complacency. Any organization that believes it is doing enough or becomes too negligent in security strategies could be heading down a dangerous path. Organizations must stay engaged and vigilant and remain dedicated to keeping their employees, suppliers, and customers informed. After all, security is and will always be a team effort.  

Read More