securitylinkindia

MassMediaLink India LLP SecurityLink India

Jang Su Jang Restaurant

VIVOTEK Enhances Security at Jang Su Jang Restaurant, US

Located in Milpitas, California, Jang Su Jang restaurant offers high quality, authentic Korean cuisine offering an extensive menu to satisfy even the pickiest taste buds. Their main goal is to provide delicious meals served with great service in a clean, modern and upscale environment. Management acknowledges that security plays a crucial role influencing sustainability of operations. The primary objective of a security overhaul including maintenance with camera additions and upgrades will allow management to monitor staff, provide overall coverage of dining areas as well as entrances and exits. Challenge VIVOTEK’s camera deployment was crucial to assist management in the day-to-day operations of the restaurant. Remotely monitoring employees, customer disputes, damage to customer property and car break-ins are all concerns upper management must address. Also, being able to monitor the main dining areas, assist hosts with seating and table occupancy and camera in stallations always provide security during non-business hours. Solution Since 2015, management at Jang Su Jang restaurant have always wanted, at a security level, no blind spots left uncovered in the kitchen and dining areas. At the same time, it is critical to maintain the restaurant’s upscale design, making sure cameras are discrete but fully functional. The new video surveillance system features twelve VIVOTEK network cameras including a 16-channel network video recorder, ND8401. FD816BA-HT 2 megapixel fixed dome network camera is equipped with a full HD sensor enabling a viewing resolution of 1920×1080 at 30fps. Featuring WDR Pro and supreme night visibility technology, this camera can capture high quality and high visibility video in high contrast or low light environments. As a professional day/ night camera, the FD816BA-HT features a removable IR-cut filter as well as IR illuminators effective up to 30 meters for superior image quality around the clock making this camera a perfect fit for overall coverage of the main dining area. Following with the FE9191 H.265 fisheye network camera was used to cover the large banquet area. Covering 360° surrounding view, restaurant staff has no blind spots and can easily run the floor without having to constantly walk the area. The 12 megapixel camera guarantees superb image quality utilizing the latest in panomorph lens technology for 180°panoramic view (wall mount) or 360° surround view (ceiling/ wall/ floor mount). Armed with a removable IR-cut filter and WDR Enhancement technology, the camera can maintain optimal image quality around the clock for unparalleled visibility under high-contrast lighting environments. Jang Su Jang’s kitchen area was outfitted with FE8174V, VIVOTEK fisheye network camera featuring 5 megapixels. Fianlly, the FD8134 fixed dome network camera completed the deployment and was installed at various exits and entrances, hallways and the cash register area. Specifically designed for indoor applications with its compact and stylish exterior, FD8134 allows discrete surveillance by capturing high quality, high resolution video. In addition to completely outfitting the property in VIVOTEK cameras, the restaurant uses VAST as the central management software designed to manage all surveillance products. VAST allows owners to operate their business efficiently on premises or remotely. Customer feedback “ When we originally started improving our security system, we chose VIVOTEK cameras and were continually impressed with the quality and reliability, we continued to do upgrades as new VIVOTEK equipment was released. Delicious, quality food is not our only priority, safety is also fundamental to our business. Our staff and customers well-being is of immense importance and helps our business operations run smoothly,” said Brian Chung, Manager of Jang Su Jang restaurant.  

Read More
access_control

Matrix Access Control Data Centre Solution

Data centers is a challenging domain where the success depends on the security of client data. Most data centers store data for more than one organization. It is very crucial for them to prevent any unauthorized access of data. Matrix offers a solution whereby data racks are secured biometrically, with records of every access along with its duration. Only authorized person can access specific racks for the stipulated time using biometric verification. The solution is available in two forms, the process of which is listed below: Solution 1: Time based rack access with single biometric device Data centre authentication: User shows biometric credentials to access the data centre. Data centre access allowed: Once user is allowed Access, he/ she will move towards rack access authentication. Rack authentication: User will click on the screen and authenticate his/ her identity through a biometric device placed alongside the screen. Rack selection: Once user completes the authentication process for gaining access to respective racks, he will be able to select the racks to be accessed from a list of accessible racks. Rack access allowed: Finally, the user will perform his assigned task within the defined time period. Solution description The features mentioned below enhance security of data centers: Centralized biometric authentication: Biometrics provides high-end security over RFID, and hence integrating biometrics with access control solution fetches complete security for data centers. Usually, an employee is required to punch twice in order to access the data rack of his/ her organization. First punch: A biometric device will be installed at the entrance of the data centre. A user will punch on the device and accordingly he/ she will be granted/ denied access. This authentication ensures that an authorized user is trying to access the data center. Second punch: Once user is granted access, he/ she will punch again at the device installed near the screen in order to access the respective racks. Once user punches, the screen will display the list of racks that he/ she is allowed to access. For example, when ‘X’ employee of ‘ABC organization’ punches second time, the screen will display a list of ABC Organization racks that are allotted to him. The user then needs to select the racks that he wants to access and accordingly he/ she will be granted access. Pre-defined rack access: Every company has designated racks allotted to them. Admin can define the racks company-wise, which means whenever a user makes his second punch, a list with racks allotted to his/ her respective company will be displayed on the screen. This feature acts as a USP for data centers as they can ensure that a rack of company ‘X’ will not be accessible to or misused by an employee of company ‘Y.’ Rack accessible for a defined time period: Every rack that is allocated to a company can only be accessed for a definite period of time. Admin can set the duration and accordingly users can access their respective racks for the stipulated time period. Solution 2: User based rack access with multiple biometric device Data centre authentication: User shows biometric credentials to access the data centre. Data centre access allowed: Once user is allowed access, he/ she will move towards rack access authentication. Rack authentication: User will show biometric credentials to access the rack. Solution description The features mentioned below enhance security of data centers: Centralized biometric authentication: Biometrics provides high-end security over RFID, and hence integrating biometrics with access control solution fetches complete security for data cent ers. Usually, an employee needs to punch twice in order to access the data rack of his/ her organization. First punch with two level authentication: A biometric device will be installed at the entrance of data center. User will show card or enter the pin code and then biometric credential on the device and accordingly he/ she will be granted/ denied access. This authentication ensures that an authorized user is trying to access the data center. Two level authentication improves the security level. Second punch: User will move to the rack and show his/ her biometric credential on the device installed at the rack. If the user is authenticated he/ she will be allowed to work in the rack for a predefined period of time and once finished, the device will close the door automatically. Predefined rack access: Every company has designated racks allotted to them. Admin can define the racks company-wise, which means whenever a user makes his second punch – a list of ABC Organization racks that are allotted to him will be displayed on the screen. This feature acts as USP for data centers as they can ensure that a rack of company ‘X’ will not be accessible to or misused by employee of company ‘Y.’ Integration with video surveillance: Matrix access control solution for data centers can be integrated with the video surveillance solution. hence, when a user tries to access the data centre through the biometric device, an image gets captured. In case of unauthorized access, having an image can prove helpful for data centers. Rack accessible for a defined time period: Every rack that is allocated to a company can only be accessed for a definite period of time. Admin can set the duration and accordingly the rack will be accessible for the pre-defined time period. Application ‘Data Rack’ management: Data centers have data of more than one organization stored in a single location. Managing the data racks is a cumbersome process for data centers. Through this solution, data centers can manage each and every company’s rack virtually along with enhancing the security. Reports The solution provides reports in the form of: ‘Which’ rack is accessed by ‘whom,’ ‘when’ and for ‘what’ time-duration. Records related to rack accessibility, time duration etc. Alarm for a rack held open for too long, access denied events etc. Benefits From data centre point of view: Easy maintenance of diverse data. Accurate record of access allowed/ denied in the software. No manual security required. Easy…

Read More
safe cities pwc

Safe Cities: Collaborative Monitoring

Cities across the world are constantly changing and evolving faster than at any point in their history. They have become more congested, and criminal activities have soared leading to the destruction of public assets. Compounding the problems, terrorism has become a major concern that presents communities and neighbourhoods with new security problems. Faced with a wealth of challenges, which are often elusive, cities are expected to manage and control the change to allow their communities to have a standard of living that meets modern day expectations. The terror attacks around the world reveal that most attacks are highly precise and well-coordinated, and targeted at high footfall areas to create a psychological impact along with monetary losses. Most of the citizens today are well aware of the risks and are in a state of constant anxiety about their safety and security. Hence, public safety has emerged as an important function for governments across the world. Accordingly, the federal and state government departments responsible for internal affairs and homeland security continuously assess and monitor the internal security situation, issue appropriate advisories, share intelligence inputs, extend manpower support, and offer guidance and expertise to the state governments for the maintenance of security. This also helps in establishing infrastructure for safe cities by capitalising on features from the following distinct categories of surveillance systems: Citywide police surveillance using Internet protocol (IP) based cameras, and Citywide community surveillance including private and institutional surveillance for collaborative monitoring. While the first system is becoming a standard solution for implementation to achieve the safe city vision, the latter is also gaining momentum to involve citizens and private and public institutions in collaborative monitoring. The following sections elaborate on the concept of collaborative monitoring.   “Today, cities face a wide range of threats, ranging from terrorism and civil unrest to kidnapping and murder. To reduce the impact of these threats, it is critical for the authorities to capture real-time information on what is happening in and around the city. Therefore, there is a growing requirement for utilising the new and emerging technologies to make our cities safer. Given this background, one of the most user-friendly technologies that can play a crucial role is the extensive use of closed-circuit television (CCTV) cameras, which play a vital part in ensuring day-to-day surveillance, crime prevention and monitoring of illegal or suspicious activities. In addition to close supervision, CCTV cameras allow post-incident analysis and collection of indisputable legal evidence. While the government and legal authorities are also encouraging both public entities/ groups and individuals to adopt such progressive technologies, mapping each and every nook and corner of a city without seeking the help of its people is impossible. This formed the basis of a unique community policing initiative called ‘collaborative monitoring.’ As the very phrase suggests, collaborative monitoring is a unique tool, wherein the security and law enforcement agency takes advantage of the extensive network of surveillance cameras deployed by communities across the city as well as the cameras of other private and government establishments on a need basis. It is an extremely prudent enabler for the police department, as while they strengthen their bond with the communities, they can use any information or footage gathered from these security cameras to support investigation and the prosecution of criminals. The advantage provided by leveraging the extensive network of external cameras ensures enhanced crime monitoring through a cost-effective, widespread and scalabe model” – Neel Ratan  India Government Leader and Regional Managing Partner, North PwC India   What is collaborative monitoring? A key enabler for a safe city is the aspect of collaborative monitoring. In cities, where every government and private establishment has realised the necessity to secure its infrastructure and establish surveillance, monitoring and incident response systems, it is important that the data gathered by these agencies is shared among them. In such cities, CCTV-based surveillance systems are being deployed by federal as well as state government agencies at places like bus stands, metros, railway stations, airports, and other critical infrastructure spots and public places. These collaborative monitoring systems can conveniently share their data in real time with security agencies of the city. Similarly, live feeds from CCTV systems deployed by private establishments such as malls, hospitals, business parks and entertainment houses can be provided to the security and law enforcement agencies, which can make effective use of the information. Leveraging the extensive network of external cameras ensures additional eyes are monitoring crime. In addition, the higher penetration of cameras helps in lowering costs. Why collaborative monitoring? In her famous work ‘Participation and Democratic Theory,’ Carole Pateman, the renowned political theorist, advocated a greater role for common people in democratic selfrule and argued that development projects are more effective when beneficiaries have a role in the way projects are chosen, planned, implemented and evaluated. Giving citizens a role in initiatives designed for their benefit is considered to be an ideal way to ensure the sustainability and success of any project. Many cities across the world have surveillance systems deployed by multiple public and private establishments. These cities are using the collaborative framework to receive video feeds from these systems to ensure real-time responses and as an invaluable source of crime detection and evidence for the law enforcement departments. For an instance, the British Security Industry Authority (BSIA) estimated that there are up to 4.9 million CCTV cameras in the UK including 7,50,000 in ‘sensitive locations’ such as schools, hospitals and care homes. This translates to one camera for every 14 people in the UK. The collaborative framework shall help to meet the following objectives: Safety and security. Improved responsiveness. Effective policing Improved management Ensuring safety and security in fragile settings remains the key objective of law enforcement agencies, in addition to crisis management during serious incidents. The strategic objectives include the following in the given table: PwC’s framework for collaborative monitoring The entire ecosystem of cameras available to law enforcement agencies becomes significant when in addition to the law enforcement cameras, these agencies also…

Read More
securityLink India

Advanced Threat Landscape Report 2018 by CyberArk

CyberArk survey shows organizations are failing to secure privileged accounts and credentials in the cloud, on endpoints and across IT environments. According to the CyberArk Global Advanced Threat Landscape Report 2018, nearly half (46 percent) of IT security professionals rarely change their security strategy substantially – even after experiencing a cyber-attack. This level of cyber security inertia and failure to learn from past incidents puts sensitive data, infrastructure and assets at risk. Security starts with protecting privileged accounts An overwhelming number of IT security professionals believe securing an environment starts with protecting privileged accounts – 89 percent stated that IT infrastructure and critical data are not fully protected unless privileged accounts, credentials and secrets are secured. Respondents named the greatest cyber security threats they currently face, including: Targeted phishing attacks (56 percent), insider threats (51 percent), Ransomware or malware (48 percent), unsecured privileged accounts (42 percent), unsecured data stored in the cloud (41 percent).  IT security respondents also indicated that the proportion of users who have local administrative privileges on their endpoint devices increased from 62 percent in 2016 survey to 87 percent in 2018 – a 25 percent jump and perhaps indicative of employee demands for flexibility trumping security best practices. The Inertia that could lead to data compromise The survey findings suggest that security inertia has infiltrated many organizations, with an inability to repel or contain cyber threats – and the risks that this might result in – supported by other findings: 46 percent say their organization can’t prevent attackers from breaking into internal networks each time it is attempted; 36 percent report that administrative credentials were stored in Word or Excel documents on company PCs; Half (50 percent) admit that their customers’ privacy or PII (personally identifiable information) could be at risk because their data is not secured beyond the legally-required basics. Inertia and a ‘Hands-Off’ approach to securing credentials and data in the cloud create cyber risk The automated processes inherent in cloud and DevOps mean privileged accounts, credentials and secrets are being created at a prolific rate. If compromised, these can give attackers a crucial jumping-off point to achieve lateral access to sensitive data across networks, data and applications, or to use cloud infrastructure for illicit crypto mining activities. Organizations increasingly recognize this security risk, but still have a relaxed approach toward cloud security. The survey found that: Nearly half (49 percent) of organizations have no privileged account security strategy for the cloud; More than two-thirds (68 percent) defer on cloud security to their vendor, relying on built-in security capabilities; and 38 percent stated their cloud provider doesn’t deliver adequate protection. Changing the security culture Overcoming cyber security inertia necessitates it to become central to organizational strategy and behavior, not something that is dictated by competing commercial needs. According to the survey: 86 percent of IT security professionals feel security should be a regular board-level discussion topic; 44 percent said they recognize or reward employees who help prevent an IT security breach, increasing to nearly three quarters (74 percent) in the U.S.; and Just 8 percent of companies continuously perform Red Team exercises to uncover critical vulnerabilities and identify effective responses. “Attackers continue to evolve their tactics, but organizations are faced with cyber security inertia that is tipping the scales in favor of the attacker,” said Adam Bosnian, Executive Vice President, Global Business Development, CyberArk, “There needs to be a greater urgency in building cyber security resilience to today’s attacks. This starts by understanding the expanding privileged account security attack surface and how it puts an organization at risk. Successfully battling inertia requires strong leadership, accountability, clearly defined and communicated security strategies, and the ability to adopt a ‘think like an attacker’ mindset.”

Read More
hochki

Role of Women in the Fire Safety Industry

The economic development of the nation is dependent on the participation of all sections of the society, more particularly women, who constitute fifty per cent of the population. There are massive employment potentialities that can be utilized by women folk. India is the world’s fastest growing economy, but has one of the lowest rates of female employment. This is the most true especially in the firefighting industry which has seen a major dearth of women in professional roles. Women are both the victims as well as strong enablers when it comes to the fire safety industry. In India, 17,700 Indians died due to fire incidents in 2015. About 48 people die of fire accidents every day out of which 62% are women. While the numbers continue to rise, the awareness on fire safety has hardly gained much recognition. Strikingly, in this whole conversation on fire safety, the female voice is missing. Unlike in the West, where a job in the fire safety industry is revered and a matter of great pride, India still has a long way to go. The instances of women working in the firefighting industry in India are far and few. In 2003, the Tamil Nadu Fire and Rescue Services appointed Priya RaviRole of Women in the Fire Safety Industry chandran as a Divisional Fire Officer, making her one of the first female fire officers in the country, and the first one to win Anna Medal for Bravery in Tamil Nadu. In 2013, the department inducted its second batch of women firefighters. In 2012, the Mumbai Fire Brigade inducted five women firefighters, making them the first in the history of the organisation. One of the biggest reasons for the low participation is the absence of a female role model. Over the last several decades, it has become an accepted understanding that improving the status of women is one of the most critical levers of international development. When women are educated and can be employed, a volley of good results follow. According to a recent study by McKinsey, if women played an identical role in labour markets to that of men, as much as US$28 trillion could be added to the global annual GDP by 2025. We require more and more women in the industry as they have the right ability to prove their mettle in various fields including defense services. One such example can be the appointment of Shrimati Nirmala Sitharaman as the Defence Minister of India. Recently Avani Chaturvedi, has also been appointed as the first Indian woman fighter pilot to fly solo. The fighter stream was opened for women in 2015 and Avani Chaturvedi, along with two other women, Mohana Singh and Bhawana Kanth were inducted into the Indian Air Force fighter squadron in 2016 where they have undergone strenuous training programme to fly fighter jets. Fire safety should also be considered as an industry to support and encourage women diversity and empowerment. The policy of fire and safety industry to recruit only male officers might be reinforcing gender stereotypes and should keep pace with international trends. While even in the West, the number of women staff is very low, but in India its much below the international statistics. One has to remember that the practice of hiring only men could be construed as demeaning to the female gender. We, in the industry, know their real purpose is to provide the safety of everyone in case of emergencies. While women have made significant gains in the past decade in terms of their noteworthy roles in different spheres of life including education, health, technology, economic participation, and political leadership, we as a nation still have a long way to go when it comes to attaining gender equality. By – Rohit Harjani Country Manager, Indian Sub-continent, Hochiki    

Read More
videonetics

Videonetics Bags FIST Award

Videonetics’ path-breaking technology ‘No Helmet Detection System’ (NHDS) has been recognized with the prestigious FIST ‘Make in India – Best Innovation award of the year’ at Fire & Safety India Expo 2018, organized by FSAI. Highly acclaimed in the industry, FIST Award recognizes extraordinary contribution of organization and individuals in the field of security, safety, firefighting and emergency response. The gala award night was attended by eminent figures from the industry fraternity. By overcoming rigorous stages of evaluation with flying colors and competing to cutting-edge products presented by other companies, the judging panel and industry experts highly voted for No Helmet Detection System which is designed and developed on ‘Indian Deep Learning’ Framework. NHDS aims to bring down road accidents and enforce traffic discipline amongst people by penalizing two-wheeler riders who do not wear helmet while driving and eventually put their lives to risk. Commenting on the achievement, Dr. Tinku Acharya, MD & Founder, Videonetics said, “We are thankful to FSAI for acknowledging and honoring our R&D efforts with the FIST award. We are committed to promote culture of innovation in India and to introduce such advanced and smart technologies that can address challenging environment for highly populated countries like India. No Helmet Detection System (NHDS) is the pioneering solution which will certainly inculcate traffic discipline amongst people, build traffic management more robust, increase road safety, eventually to make India smarter and safe.”

Read More
dahua_h.265

Dahua Technology H.265 XVR Product Series

Dahua Technology has recently launched its H.265 XVR product series. After upgrading its codec format from H.264 to H.265 and then to H.265+, H.265 XVR delivers a more cost-efficient storage method with smaller storage, stronger compatibility and enhanced intelligence, solving the much higher demand on storage capability placed by the widespread of 4K/ 4MP UHD devices, and offering the customers and partners more business opportunities. Equal quality, smaller storage under H.265 codec With the H.265+/ H.265 supreme compression technology applied in HDCVI products, Dahua H.265 product series provides new choices for the video surveillance industry. As a cutting-edge video codec, H.265+ is able to reduce up to 90% of transmission bandwidth and storage while maintaining excellent image quality, resulting in the use of less HDD space and resources. Seamless connection with strong compatibility The widespread compatibility of the H.265 XVR guarantees a seamless connection with multiple cameras and all H.265 encoding-based platforms or devices. With a stronger processor, it even supports a maximum of 4 channels of intelligent video surveillance and a maximum N+N channels with IPC access, where each channel receives up to 8MP input. For existing video surveillance systems, H.265 XVR can also serve as an upgrade by replacing the storage device only. Also, by converting audio into digital signal, the entire product series support broadcast-quality audio through loss-less audio transmission, vastly improving audio quality. XVR 4.0 powered intelligent device H.265 XVR series brings a user-friendly experience with a new generation XVR4.0 GUI interface, providing with flat interface and simplified functional modules. Also, supported by IoT system, H.265 XVR product enables multidimensional surveillance by linking with diverse sensors to collect information such as temperature and humidity that can wirelessly trigger an alarm if necessary. Keep working during power-cut with builtin battery Moreover, the built-in battery in the Dahua XVR E Model can feed the XVR and cameras to keep the surveillance system working for up to 1 hour, eliminating worries from unplanned power-cut.

Read More
invixium

Invixium Multimodal IXM TITAN

Invixium, an innovator of biometrics solutions, will be unveiling a new benchmark in multimodal authentication technology at ISC West 2018. The new IXM TITAN promises to be the most advanced biometric product ever engineered, reflecting Invixium’s drive to become the world leader in multi-purpose authentication solutions. TITAN is equipped with facial recognition as the primary biometric modality, fingerprint or finger vein authentication as the secondary, and consolidates features for access control, time and attendance, video intercom and video surveillance into a single device that accommodates a diverse host of applications with extreme efficiency and convenience. TITAN was conceived and engineered using a unique set of design parameters including unparalleled application versatility, simplicity of use and implementation, industryleading processing power and exquisite aesthetics that clearly differentiate it from traditional biometric devices. “TITAN is a master stroke,” says Shiraz Kapadia, CEO and President of Invixium, “We engineered TITAN to be an iconic biometric product – beautiful enough to be installed in luxury homes and corporates, extremely rugged for installation in the harshest environments, technologically futuristic to be an IoT connected device, and security focused with its multimodal and multifactor authentication versatility. The introduction of IXM TITAN at ISC West is a milestone for Invixium as this marks our entry into North America with a plethora of biometric products and solutions.”

Read More
hid convergence

The Convergence of Physical & Logical Access

For many security professionals, recent high-profile data breaches have shifted attention to external cyber threats. Despite this newfound focus, the Institute for Critical Infrastructure Technology reports that more than half of all cybersecurity incidents can be traced to insiders with legitimate access to corporate facilities and networks. Another survey from the Ponemon Institute reveals that the majority of respondents are more concerned by outside threats than those that originate internally. While external threats are very real, working to confront internal vulnerabilities can prevent incidents from happening in the first place. By addressing both physical and logical access in a more unified approach, organizations can reduce their risk for a costly breach while also improving user experience and operational efficiency. This idea is frequently referred to by the industry buzzword of ‘convergence.’ From a technical standpoint, convergence is defined as “the merging of distinct technologies, industries, or devices into a unified whole.” In terms of access control, convergence can be viewed as “the merging of physical and logical access control technologies to provide a more unified and simplified approach to identity management.” “Convergence means a simplified approach,” said Sheila Loy, Director of Healthcare Industry, Identity and Access Management at HID Global, “That can mean many different things, but it’s essentially making it easier for the user to get both digital access and door access. That usually comes in the form of a card or a mobile device – something that can do both.” While the notion of convergence is nothing new, this approach to security is becoming an increasingly viable way to mitigate threats. To explore this further, ASIS International recently partnered with HID Global to survey security professionals regarding their experience and related plans on convergence projects. The data in this paper is based on the responses of 745 ASIS International members who have direct responsibilities in physical and/ or information security. The benefits of convergence: Improved user experience, operational efficiency and security Security administrators are looking for solutions that are easy, convenient and fast. By introducing solutions that better blend physical access control (PACS) with logical access control (LACS), organizations of all types will enjoy three key benefits including: 1) positive user experience, 2) enhanced administrative experience, and 3) improved security. Positive user experience Oftentimes, the weakest link in even the strongest of security systems lies within the end user. If interactions with security technologies are confusing or cumbersome, employees will take shortcuts that introduce unnecessary vulnerabilities. Converged PACS and LACS solutions help reduce this risk by boosting convenience, particularly by requiring employees to only carry one card or mobile device. This type of solution also eliminates the need to constantly refresh passwords. In today’s world, most end-users wear an ID badge to access facilities, which is a form factor they are accustomed to using. Even more, many employees either use a user name and password or a one-time password fob or token to access networks. While this approach may provide an additional layer of security, it is prohibitive in terms of convenience. Alternatively, providing a single form factor for both physical and logical access creates a more streamlined user experience, which ultimately increases user adoption to desired security policies. “Building occupants who have entitlements to both physical areas and logical applications will see an enhancement in their experience,” said Brandon Arcement, Director of Product Marketing at HID Global, “Convergence results in greater employee efficiency and a more pleasant work environment for building occupants. It’s easier for employees to carry one card or one mobile device to access both systems, rather than having to carry a card for the door as well as a fob for the computer or having to remember passwords.” In terms of logical or network access, one major pain point for end users is the need to remember and frequently reset their passwords. When ASIS International members were asked, “How access to network and logical applications is done today,” a resounding 85% of respondents indicated that they use a user name and password. 85% of respondents also indicate that they have an organizational policy regarding the creation of passwords such as requiring numbers or special characters. Not only is this inconvenient for users and administrators, it presents another common security risk – employees writing their passwords on notes left visible on their desk. Enhanced administrative experience Converged access control solutions provide an improved administrative experience. When survey respondents were asked to rank a series of benefits of PACS and LACS convergence, the top response was ‘easier to manage employee credentials,’ followed by ‘one card for multiple applications.’ These top responses reflect two key angles within an improved administrative experience. First, many applications used to manage credentials are now web-based with secure, simple access for administrators. This allows security teams to issue, modify, or revoke credentials away from the office or during off-hours. The second angle is the ability to deploy a converged ‘high value’ form factor that allows for multiple applications. For example, using one card for multiple uses reduces costs for additional or replacement cards, as well as reduces the time required to produce multiple credentials for individual applications. According to survey data, the value of leveraging smartcards for applications beyond physical access is more than theoretical – 73% of respondents agree that they have interest in using smart cards for applications beyond traditional physical access control. Finally, more converged access control solutions provide security administrators with more visibility into audit data. This makes achieving compliance easier, thus reducing the potential for associated fines and damaged reputations. Improved security The most important benefit of any technology is improved security. Innovative technologies for physical access include contact and contactless cards with encryption that adds additional layers of security upon entering doors, elevators or parking garages. Meanwhile, digital certificates loaded onto that same smart card can ensure trusted login to networks and applications, as well as encrypt e-mails and digitally sign documents. Converged solutions improve security in three key areas: Increased adoption rate of converged…

Read More
Hikvision_Retail Leadership_Summit_2018

Hikvision participates at Retail Leadership Summit 2018

Hikvision has participated in the 11th edition of Retailers Association of India’s (RAI) recently held Retail Leadership Summit (RLS), Mumbai to showcase its latest products and solutions in the video surveillance and security domains for the retail sector. The Retail Leadership Summit (RLS) was flagged off with an inspiring opening speech by B.S. Nagesh, Chairman, RAI and Founder, TRRAIN. The Summit revolved around the central theme ‘Customer Centricity- Redefining Values and Valuations. “Retail Leadership Summit (RLS) is a great platform for networking among existing and potential retailers, developers, logistics and supply chain organizations. It is a right place to showcase the latest innovations in the surveillance and security solutions for retail and eCommerce sector,” said Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd. At the event, K.K. Dakhara, Retail Vertical Head, Prama Hikvision India gave a presentation on Hikvision’s new solution for warehouse, logistic and supply chain and explained their advantages. “Hikvision retail smart solution focuses mainly on analytics, consumer behavioral analysis and artificial intelli gence. It is useful in multiple aspects such as retail business surveillance, manpower management, business operations, selection of appropriate product based on target customer, designing marketing plan and loss prevention,” said Mr. Dakhara, “The wide applications of machine learning and DeepinMind technology will set the trend for the retail industry by getting critical data and deep insights from consumer behavioral analysis.” “The Retail Leadership Summit has been created to ensure that retail leaders across the country can come in and discuss matters that are relevant to retail at industry-level. Modern retail in India is becoming more and more competitive and is growing at more than 15 per cent. This kind of growth requires a different focus for retailers to be able to exist and thrive. RLS is about customer centricity and the resulting valuation. However, the values that a company works with are an important contributor to the way a company gets formed and functions. The three aspects i.e., customer centricity, values and valuation are an apt set of topics for every retailer who is trying to grow and flourish in this consumption-led market,” said Kumar Rajagopalan, CEO, Retailers Association of India. Hikvision also displayed their retail solution at a booth there. The visitors were keen to know more about people count, heat map, POS integration, face analysis, parking management solution, and warehouse, logistic and supply chain solutions. The event turned out to be a good platform for Hikvision’s retail solutions for promotions and getting enquiries.

Read More