securitylinkindia

Securing ATMs 24/7 with Intelligent Security Technology

ATMs have become a cornerstone for the day-to-day life of millions, but they are vulnerable to attacks. The global ATM Industry Association has reported a 12% increase in ATM crimes during 2017. Attacks often involve ATM users, potentially injuring them, and thereby causing them trauma. Since ATMs are mostly situated outside buildings and are made for use at all times of day and night, securing them is a challenge – and therefore banks are turning to more intelligent solutions. An outdoor vulnerability According to ATM Industry Association (ATMIA), there is an estimation of about 3.5 million ATMs in the world serving those in need of cash 24/7, 365 days a year. This, coupled with the fact that they hold hard cash, makes them an attractive target. Criminals target these machines, or more precisely, the people using them in numerous ways. They distract customers at ATMs in an attempt to take their cards or cash, or to steal their PINs for later use. At cases, they also install false card readers that sneak customer’s card details for reuse. On the other side of the story, banks need to deal with customers’ disputes. In the situation of a very small percentage of ATM transactions, customers question whether the transaction has been carried out as requested – or even dispute at all in real time for any error while making the withdrawal. Thus, security precautions for ATMs are an important part of an overall security solution for financial institutions. When deep learning technology steps in Inside an ATM machine, two covert cameras are installed – one trained on the user and the other on the ATM panel. Deep learning technology embedded in the ATM security system can detect any ‘abnormalities’ in the facial scenes in front of it, referring to the existing data patterns. So, if there is another face in the picture (for example someone looking over a user’s shoulder, or if the person wearing a mask), an alarm can be triggered in the security center. By using the same technology, the security system can also flag if the number pad is covered with a strip to steal PIN codes, or if a false card reader (or ‘skimmer’) is present to steal card details. All of these ‘smart’ alarms streamline the security monitoring processes, meaning that security personnel can react to real-time scenarios and would not waste time on false alarms. The footage can also provide evidence for any investigation. Hikvision solution Hikvision DeepinMind NVR – a robust deep learning ‘engine’ – takes information from the camera and analyses it using deep learning algorithms. This also ‘manages’ footage in conjunction with other NVRs and a video management system, providing a powerful tool set for security and business intelligence. Securing assets and mitigating risks through security solution is a lot easier with deep learning technology. Even ATMs outside a building can be safer, avoiding fraud and protecting customers every day.  

Read More

Minimizing Downtime in Critical Environments

At worst, unplanned downtime in a critical environment can cause a catastrophic event that negatively impacts public safety and/ or the environment on a mass scale. At best, it could mean production losses costing thousands, or even millions, of dollars. A predictive maintenance strategy that incorporates Axis technology can help companies minimize costly downtime and improve their bottom lines. At worst, unplanned downtime in a critical environment can cause a catastrophic event that negatively impacts public safety and/ or the environment on a mass scale. At best, it could mean production losses costing thousands, or even millions, of dollars. A predictive maintenance strategy that incorporates Axis technology can help companies minimize costly downtime and improve their bottom lines. Considering the stakes, it’s no wonder that companies are transitioning from a reactive to a preventive and even predictive maintenance strategy. But many of these companies are still relying on an ‘old-school’ route-based approach – sending technicians out at scheduled intervals to physically assess and record critical asset findings. For a typical commercial petroleum company with over 20,000 well sites, this represents a significant cost. And inevitably, critical assets will either be over-maintained or under-maintained as they rarely break-down on schedule. When the cost of oil is low every barrel counts. But operational efficiency is key to a healthy bottom line. That’s why progressive companies are adopting a predictive maintenance strategy that includes distributed online monitoring. With advancements in automation, wireless technology, SCADA systems and solar powered hardened devices, remote data collection from permanent sensors provides much better insight on the status of critical assets and helps keep operations flowing smoothly. Let’s look at how Axis technology is ‘fueling’ this trend Thermal imaging for better flare stack monitoring The controlled combustion of excess gases in the chemical and petrochemical industry is essential to eliminate pressure on critical assets. Should the flame go out, it poses a serious health and safety risk for workers – and carries a hefty fine from environmental authorities. Axis thermal cameras provide better flare stack monitoring, ensuring a stable thermal profile and proactively sending an alarm to operators if the flame decreases. Explosion protected cameras improve health & safety In hazardous environments, preventing injuries and fatalities is paramount – both for the safety and well-being of workers, as well as the associated downtime cost. Certified for explosion-prone applications according to all applicable international standards, Axis explosion-protected cameras allow HSE site engineers to monitor areas where accidents typically occur – such as the working of tubulars on drilling rigs. Additionally, their temperature alarm camera monitors for temperature deviations and leaks in critical assets – to prevent an incident before it occurs. A new and attractively priced alternative to traditional steel housings, the AXIS F101-A XF P1367 is specifically designed for hazardous environments. Its lightweight aluminum housing is Class I/II/III, Division 1, Zone 1, ATEX and IECEx certified, it’s easy to configure remotely, and it delivers clear images in challenging light conditions. The red color also helps workers locate it to signal operators in emergency situations. Real-time condition-based monitoring With the advancement of video imaging and processing power, network cameras are a valuable redundancy in condition-based monitoring systems – providing visual confirmation of sensor alerts and full situational awareness in an emergency. Edge-based video analytics enable the cameras themselves to serve as a primary sensor for HSE engineers  to detect e.g., occupancy levels on a drilling rig, PPE compliance, or obstructed evacuation routes. Better communication with network speakers With Axis network speakers, it’s easy to communicate both live and alert-based pre-recorded messages to workers in remote locations – to warn of a safety risk or instruct them to take action on a sensor alarm. With the introduction of Power-over-Ethernet (PoE) speakers, oil and gas companies also save on the maintenance and implementation cost of PA systems. What’s more, the system can scale without having to upgrade proprietary, bulky amplifier racks, and the integration of Axis speakers and cameras is a simple one-click configuration process. Connected technology Axis network I/O relay modules extend the functionality of any Axis device and integrate with other facility systems such as fire alarm, HVAC and BMS. This technology is particularly useful in extending the I/O signals from any field-based temperature sensor to the central SCADA system to trigger, for example, strobe lighting, loudspeaker messaging and camera recordings in an emergency. Reliable intrusion protection Any unauthorized physical intrusion can have a major impact on critical assets and cause downtime. With an Axis intrusion protection solution, one can safeguard the whole site – from perimeter to critical core. A combination of thermal, radar and PTZ technology detects, identifies and tracks intruders. Access control limits free movement in critical or hazardous areas, and audio capabilities with alarm-based pre-recorded messages deter any unauthorized entry. Getting more from your technology It all comes back to operational efficiency contributing to a healthy bottom line. A complete system of Axis video, intelligent analytics, access control and audio address all key aspects of critical infrastructure protection – intrusion, operational efficiency and health and safety – all of which present risks to unplanned downtime. By incorporating Axis solutions in the condition-based monitoring strategy, the user can more easily detect incidents before they happen and keep production up and running.  

Read More

The Top Five Factors Driving Access Control Market Growth

It’s safe to say that both the perception and reality of growth in the access control market have certainly changed over the last few years. What was once known for its slow and conservative trajectory has now transformed into an industry that is seeing fast-paced development, with the latest forecasts predicting the global market will grow at a CAGR of 13.2% from 2018 to 2025, reaching a value of $16.66 billion by the end of that timeframe. As is common in any segment of the security industry, this growth can be attributed to a number of factors, with each one playing an important role in the overall evolution of the market. Here we take a look at the top five: Increasing threats Soft targets around the world such as educational facilities, venues, shopping centers, transportation hubs and more, are continuing to face the challenge of staying prepared for the increasing significance and frequency of threats. One of the first methods of protection that often comes to mind for these facilities is securing the perimeter of the building or campus, leading to an increase in the use of access control solutions that enhance safety and allow for swift lockdowns with the push of a button. Advanced technology The emergence of the cloud and Internet of Things (IoT) have positively impacted the entire security industry as a whole, and this undoubtedly includes the access control market. These intelligent technologies have opened up new possibilities for the traditional access control systems of the past such as remote monitoring, less cumbersome installments and central reporting/ management. Additionally, technology such as mobile credentials and biometrics offer exciting and innovative options for access control solutions, propelling market growth through interest in the convenience of these features. ACaaS One of the key benefits the cloud creates for the access control market is the access control-as-a-service (ACaaS) model, which we’re seeing a high adoption of – particularly in small to medium sized businesses (SMBs) – and is therefore facilitating market expansion. SMBs are taking advantage of the ability to turn over system management to an integrator, benefiting from cost savings, continued support and scalability. Integrations Open-platform technology has given rise to the seamless integration of access control systems with other solutions, encouraging market growth by allowing organizations to obtain added functionality from their technology investments. Enterprises can seamlessly converge their access control with surveillance cameras, video management systems (VMS), intrusion platforms and more, enabling them to invest in a solution that can address multiple needs. Added functionality Though access control is primarily used for security purposes, as these systems become more intelligent and capable of engaging with other operations outside of safety, their value increases and therefore leads to market growth. For example, an access control system can integrate with a building management system to lock/ unlock doors for an event, turn on/ off lights or control temperature. Over the next few years, as technology advances further and becomes smarter, we can expect to see these trends continue to push the access control market forward. It’s encouraging to see how far its come and we look forward to embracing new possibilities in an effort to help organizations keep people, assets and property safe.  

Read More

Eagle Eye Networks Enhanced Eagle Eye Cloud VMS

Eagle Eye Networks unveiled enhancements to the Eagle Eye Cloud VMS supporting 15 additional third party mobile and body worn cameras. The Eagle Eye VMS provides simultaneous operations, search, and cloud storage for fixed and mobile cameras. Managing and retrieving body worn camera video have historically been a separate process from the primary video surveillance system. With Eagle Eye, this can now be an integrated and cohesive process that requires less training, and is more secure and reliable. The Eagle Eye mobile and body worn camera system includes: Viewing mobile and fixed camera footage in one cohesive interface eliminating the need for multiple applications. Archiving, storage and retrieval of time-stamped mobile footage with GPS coordinates and tracking. ● Secure sharing of video via mp4 files or via direct links to interested parties. Open platform that provides compatibility with a broad array of cameras. Today, Eagle Eye Networks provides support for over 3,500 mobile and fixed cameras. Access to a true cloud system meaning virtually unlimited scalability, triple redundant data center architecture, full encrypted video, and comprehensive cyber security. Eagle Eye Video API Platform delivers unlimited video analytics from partners. With video stored in the cloud and open API’s, new AI analysis is being continually developed and improved. “It’s been proven repeatedly that open systems architectures win over proprietary systems. Eagle Eye Networks believes in open architecture standards and our platform, Eagle Eye Cloud VMS, demonstrates this. Extending our platform to encompass mobile cameras is a logical extension of our open camera platform. Our open platform ability to integrate third party AI and analytics is delivering on a broad set of applications for our customers,” said Dean Drako, CEO of Eagle Eye Networks. Eagle Eye Networks customers have desired integration of mobile and fixed camera surveillance to reduce risk in commercial industries – in-home services, retail, guarding, commercial delivery services, real estate sales, and other service-oriented verticals. The mobile camera video and GPS data will be securely transferred to the Eagle Eye cloud data center where video footage can be reviewed, analyzed and stored.  

Read More

How can SMBs Protect Their Data in the Cloud?

More and more small to medium sized businesses (SMBs) are using cloud storage. This is due to the huge benefits the cloud brings in terms of productivity and flexibility. However, most SMBs seem to still be suspicious about it. Actually, recent research shows that 61% are convinced that their data is unsafe in the cloud. Why, and what can be done about it? SMBs are worried about their data in the cloud SMBs are afraid to lose visibility and control over their data once they hand it over to a third-party cloud platform. Their first worry is that it’s harder to detect unauthorized access when data can be accessed from anywhere in the world and on any device. On the contrary, when data is stored on-premise, you need to be physically present in the office to access these files. So it creates a natural barrier against unauthorized access from outside the organization. Furthermore, access can be restricted to specific devices only. SMBs also worry about the fact that it’s harder to stop or prevent data theft from the leaving employees. For the same reasons, it is easier to spot an employee stealing data when it’s stored on the physical desktop computer. With cloud storage, it becomes pretty easy for leaving employees to steal information before they go. Finally, hybrid storage environment can be complex. Using a mixture of on-premise and cloud storage increases productivity. Though, managing the security of the data stored across multiple environments becomes very challenging. The attitude regarding cloud storage is not helping According to the same research, a lot of organizations believe their own data is more valuable than that of their clients. This is pretty disturbing to know that third-party and insider breaches are on the rise. Those who operate with large and complex supply chains will be concerned by this mentality given the lack of visibility and control over data security once it lives on third-party systems. Furthermore, as we said previously, organizations using a mixture of on-premises and cloud storage systems are having troubles managing the security of data – either their clients’ or their own.  Besides, almost half of SMBs are convinced that moving to the cloud has harmed their security and 59% assume that the native security of their cloud storage provider is not strong enough to protect their data. Knowing that, it is pretty worrying to see that 80% are only relying on the native security of the cloud storage provider they’re using and only 1 out of 10 organizations is using a third-party cloud file monitoring tool to prevent unauthorised access to sensitive data. SMBs clearly need a more efficient way to ensure their data in the cloud remains safe. Moving your data to the cloud does not reduce an organisation’s need to secure access to and usage of file data. SMBs’ solution to protect their data in the cloud The attitude regarding cloud storage needs to change. Nowadays, a majority of organisations share a big amount of valuable data with their clients over email or in the cloud. Knowing that supply chains attacks are on the rise, it only takes one mistake from one supplier to have your data compromised. Furthermore, most organisations today look into the cybersecurity of their partners before choosing to work with them. It is therefore of great importance that organisations can show that they can keep their clients’ data safe. To be able to protect your data both on-premise and in the cloud, you need to proactively track and audit on all access to files and folders. You need a solution in place that can provide a single consistent view of the security of your files and folders across all your storage servers – whether on-premises or on a third-party cloud system. It needs to be able to report and alert you in real-time to suspicious file activity the moment it occurs. That way, you are sure that if someone other than an authorized employee tries to access your data, you’ll be the first to know about it and therefore you can react quickly before any damage is done. By-  François Amigorena – Founder and CEO     

Read More

Securing ATMs 24/7 with Intelligent Security Technology

ATMs have become a cornerstone for the day-to-day life of millions, but they are vulnerable to attacks. The global ATM Industry Association has reported a 12% increase in ATM crimes during 2017. Attacks often involve ATM users, potentially injuring them, and thereby causing them trauma. Since ATMs are mostly situated outside buildings and are made to use at all the times of a day and night, securing them is a challenge – and therefore banks are turning to more intelligent solutions. An outdoor vulnerability According to ATM Industry Association (ATMIA), there is an estimation of about 3.5 million ATMs in the world serving those in need of cash 24/7, 365 days a year. This, coupled with the fact that they hold hard cash, makes them an attractive target. Criminals target these machines, or more precisely, the people using them in numerous ways. They distract customers at ATMs in an attempt to take their cards or cash, or to steal their PINs for later use. At cases, they also install false card readers that sneak customer’s card details for reuse. On the other side of the story, banks need to deal with customers’ disputes. In the situation of a very small percentage of ATM transactions, customers question whether the transaction has been carried out as requested – or even dispute at all in real time for any error while making the withdrawal. Thus, security precautions for ATMs are an important part of an overall security solution for financial institutions. When deep learning technology steps in Inside an ATM machine, two covert cameras are installed – one trained on the user and the other on the ATM panel. Deep learning technology embedded in the ATM security system can detect any ‘abnormalities’ in the facial scene in front of it, referring to the existing data patterns. So, if there is another face in the picture (for example someone looking over a user’s shoulder, or if the person wearing a mask), an alarm can be triggered in the security center. By using the same technology, the security system can also flag if the number pad is covered with a strip to steal PIN codes, or if a false card reader (or ‘skimmer’) is present to steal card details. All of these ‘smart’ alarms streamline the security monitoring processes, meaning that security personnel can react to real-time scenarios and would not waste time on false alarms. The footage can also provide evidence for any investigation. Hikvision solution Hikvision DeepinMind NVR – a robust deep learning ‘engine’ – takes information from the camera and analyses it using deep learning algorithms. This also ‘manages’ footage in conjunction with other NVRs and a video management system, providing a powerful toolset for security and business intelligence. Securing assets and mitigating risks through security solution is a lot easier with deep learning technology. Even ATMs outside a building can be safer, avoiding fraud and protecting customers every day.  

Read More

Johnson Controls Announces VideoEdge Integration with EntraPass go Mobile App

Johnson Controls is introducing the integration of the Tyco Kantech EntraPass go Mobile App with the Tyco American Dynamics VideoEdge software, enabling remote management of access control, video and intrusion tasks for seamless, on-the-go security system operation from a mobile device. The American Dynamics VideoEdge integration with the EntraPass go Mobile App provides a single easy use interface for managing, responding and controlling aspects of the video management system infrastructure through the use of the EntraPass go Mobile App. Video management capabilities include the ability to view live video with PTZ control, video playback with manual search, and the ability to view video linked to access and/ or intrusion events. With the EntraPass go Mobile App, users can manage and create cards, lock and unlock doors, view live video, arm and disarm intrusion partitions and request reports. This free app enables users to interact with EntraPass security management system software from anywhere, without being tied to the EntraPass workstation. The VideoEdge platform improves the efficiency of security personnel and daily business operations by creating powerful video management solutions allowing users to leverage high-performance video streaming, analytics and video intelligence. EntraPass go Mobile App is available on Android and Apple devices.  

Read More

Why are Shopping Malls Easy & Lucrative Targets for Terrorists ?

In the 21st century, shopping malls have become the symbol of prosperity. They are omnipresent across the globe – especially in metropolitan cities. India, which is one of the fastest growing economies of the world today, is also not lagging and has made a remarkable part of this global phenomenon that is fast spreading its footprints in Tier-II and Tier-III cities of the country. Shopping malls are also transforming the landscape of rural India. The nondescript and sleepy towns have become vibrant and are buzzing with commercial activities with population drawn to the ambience of flowing music, entertainment, glitter of lights, and opulence of the variety in the stores. Today malls which have become synonymous to shopping culture across all sections of urban India present a potent symbol of rising middle class, and have become the ultimate destination for the shoppers with wish lists in their hands. Other side of the coin – Easy target for terrorist attacks While visiting shopping malls is normally a must in today’s time, they have also become an easy target for terrorist attacks. The brazen and gruesome attacks by terrorists on shopping malls in the past decades have left a very tragic, devastating and emotionally wrenching scars down the memory lane of the entire human race. An analysis by Rand Corporation in 2006 reported 60 such attacks on shopping malls in 21 countries since 1998. A mere glance at the historical data of such heinous acts of terrorists as available on Google and tabulated below is very scary, and needs serious attention of the security professionals. Peculiarities of shopping malls The shopping malls are very different from the likes of airports which provide specific and specialized customer services and travel experience. Same is the case when we compare shopping malls with shopping complexes which fall grossly short of quality shopping experiences. The shopping malls are prominently crowd centric as footfalls are the core of their business model. They are usually fat in area – spread in lakhs of square feet of retail space, and multi-storeyed – to house a remarkably large number of stores to ensure all famous international brands are available. Food courts and cineplexes, casinos and pubs, kids play zones, promotional activity zone etc. are the major attractions of malls. Other facilities include large multilevel parking spaces for vehicles, gen sets for power back-ups, escalators and passenger lifts for easy movements of the shoppers, 24×7 presence of the security and facility management personnel, flashy glitter of colorful LED lights in stores and surroundings, and so on. Security challenges in shopping malls To be commercially viable and attractive, the shopping malls have got inherently to be in open areas – with wide ranging access for retailers and shoppers and therefore with copious car parking capacity and other above given facilities. This increases the potential vulnerability and challenges before the security system. Some of the other major challenges faced by the security in a shopping mall are: a) Multiple stakeholders – The ownership of the shopping malls is usually in the hands of many stakeholders. b) Large crowd – The sheer numbers are sitting ducks that invite terrorist attacks. c) Access to public – Malls thrive on footfalls and thus allow unimpeded access to all. d) Centre of attraction – Attract wide cross section of the population. e) Business models – The marginal cost of additional security measures is termed extremely high. f) Personal privacy vs security – Frisking, search and X-ray scanning of baggage are generally not longed for by the shoppers and hence rarely allowed. g) Unwillingness for enhanced security – Most countries are not willing to turn shopping malls into fortresses for various obvious reasons. Risks and threats The spectrum of risks and threats to the security of a shopping mall can thus be summarized in terms of – shop lifting by shoppers, theft and pilferage by the employees of stores, accidents and thefts in car parking, public violence in casinos and pubs, fire incidents for varied apparent reasons, bomb threats and active shooter incidents, inappropriate behavior in passenger lifts and parking amounting to sexual harassment, and many more. Active shooter Amongst the risks and threats listed above, active shooters are the biggest security threat. They are highly trained, hard core, motivated and mission oriented crusader with a singular aim to damage public and their assets. The characteristics of a shopping mall offer them the freedom to gauge the security envelope through repeated reconnaissance and surveillance of the target points and areas, and then strike at right place and time of his choosing within the vulnerabilities identified.   Post 9/11 scenario The aftermath of 9/11 attack on Twin Trade World Towers, New York in the USA, which shook the mindset of a large section of countries, has enabled a dramatic change in the entire security outlook of these infrastructures. The profile of the shopping malls has started deeply embedding security and safety in their processes to leave very marginal and reduced scope of security lapses. The HHMD (hand held metal detectors), DFMD (door frame metal detectors), X-ray scanners and CCTV surveillance play the key role in reinforcing todays’ security umbrella. The AI (Artificial Intelligence) enabled systems for tracking a suspect through facial recognition technology is the latest addition to the recent fleet of security gadgets. The scope of integrating security and surveillance devices has further augmented the viability of security system. The presence of security personnel in civil clothes to ensure that they remain unobtrusive and un-conspicuous while attempting to identify suspicious elements within the Mall serves a big deterrent. However, one needs to home on the ideology of terrorists to figure out the probability of an imminent terrorist attack. Why a shopping mall cannot be made an impregnable fortress A one line answer suffices to address this issue that a stringent security arrangement goes totally against the ethos, culture and experience level expected by both shoppers and retailers – as with such deployments the very purpose of creating malls…

Read More

Shorten Your Checkout Lines to Enhance Customer Experience

Today’s shoppers have less time than ever to get their grocery shopping done, and they expect a fast and easy purchasing experience. Waiting to pay is a huge problem for retailers and shoppers alike. Customers who find themselves in a seemingly endless line may grow intensely frustrated – upto the point that they abandon the store. Long checkout lines are therefore damaging customer relationships.   In fact, a recent study from Forrester Research and Digimarc stated that long lines are one of the main reasons for shopping abandonment. To avoid wasting time, more than half of shoppers would like to spend less money in a store, or even walk away entirely. Shorten the lines with queue detection technology So how to keep waiting times to a minimum and react quickly to growing checkout lines – intelligent queue detection technology is the answer. To tackle this problem, many forward thinking retailers are now using queue detection technology to keep track of lines in real time during the checkout process. Queue detection technology uses cameras to count the number of people in a line to a predetermined threshold of customers. Once the number reaches the threshold, and more customers are continuing to wait, the system alerts store management to open new checkouts. New customers, increased revenues and smarter staffing Given the importance that customers place on a fast checkout process, reducing wait times is a key investment opportunity. Retailers that boost checkout efficiency can not only please their existing customers, but also entice new customers who may have avoided shopping there previously. Customers may also spend more money if checkout is faster. In a study by Oracle, 94% of respondents stated that they buy food and beverages at sporting events – and 58% of these respondents said they would spend even more money if they didn’t have to wait in lines. What’s more – over time, queue detection technology can enable managers to improve the operational efficiency of a store. Armed with new insight into the typical throughput of customers at different times, managers can scale staffing levels up and down accordingly Hikvision: the market leader in queue detection Hikvision’s market-leading queue detection technology is purpose-built to offer cutting-edge flow analysis to retail outlets including supermarkets, exhibition halls, chain stores, and any such situation where waiting to pay is required. Embedded into their high definition cameras, and powered by deep learning algorithms, this easy-to-use technology is highly accurate at counting people, and can even recognize different individuals and their specific dwell time. Store management can set thresholds for the maximum number of people in an area – be it the checkout or elsewhere – as well as for the longest stay duration of a single person. Once a threshold is exceeded, the system will immediately alert managers so they can take appropriate action.  

Read More

Power-over-Ethernet & Campus Security

Power-over-Ethernet (PoE/ PoE++) is a technology that enables devices to receive electrical power over a standard ethernet cable. Ethernet technology has evolved over the last few decades and is pervasive in almost every office, and small and large businesses. It is used to network servers, storages etc., that provides end-users a critical service as far as their business operations are concerned. In parallel, over the last decade or so, many companies are manufacturing devices that use the Internet Protocol as a means of communication. This allows for many disparate devices to communicate with each other using the IP protocol and all of them today use the ethernet cable. This makes sense because the price point of ethernet technology has dramatically dropped over a period of time, which is seen across all technology spectrums such as network switches, NAS storage, fire alarms, access control systems, BIO ID systems, surveillance cameras, video management software, and innumerable other technologies that have come to benefit from the ubiquitous IP protocol and Ethernet L2 routing protocols. One can now imagine all the possibilities of building a single unified secure system with very different devices – all networked together but unified by a single software platform. However, there is a caveat in all of this. Most of the devices are located in different parts of the infrastructure and they all need electrical power to run and function reliably. As all of them use ethernet cable to communicate – including electrical power within the connecting ethernet cable – it eliminates the need for a power supply at each terminating device, and that results in cost savings. Every manufacturer has to ascertain that the devices are PoE compliant which results in half the number of cables being used to network plus has the added advantage of a 100 meter run between the device and the nearest network switch. In summary, PoE/ PoE++ is a simplifying and unifying technology which allows system integrators to build custom solutions as per the customer’s requirements without having to worry about different power supplies with different power ratings for each device. There are several PoE products available in the market which can be easily searched. Once the requirements of the customer are known, one can make a choice of vendor and budgetary limitations to put together an appropriate solution. Following paragraphs illustrate various considerable points as an example for using campus security: Basic campus security requirements and the driving forces behind them 24/ 7 school/ college curriculums necessitate authorities to revisit campus security requirements such as: Increase in on-campus crime rates due to various factors, Different and unique requirements for different departments within the same campus, Managing policies across multiple infrastructures are increasingly complex, Troubleshooting is extremely tedious and time consuming if a unifying system integration plan is not put into place at the very beginning of the project, and Ongoing daily maintenance and upkeep of devices and network infrastructure. Other essential campus considerations Centralized cloud-based management that becomes important when one has to manage several campuses at the same time. Security which becomes critical when all campuses are tied together through the cloud as a single security breach can wormhole itself to all campuses. PoE devices which act as a unifying technology at the base level of the security architecture. Multi-gigabit backbones for future easy expansion as the campus and infrastructure size increases. MAC-level communication encryption between all switches and compute/ storage devices in the network infrastructure. The above diagram shows many components that go into building a security solution. This is more from a hardware perspective and shows a typical layout. A key point to note is the firewall and the WAN connection with outside of the campus. This WAN could connect to other campuses, or to the cloud that connects to other campuses or to both. Special attention needs to be paid to this particular component of the system. Several security techniques are available out in the market to make this point of the network achieve the highest possible security breach block. Challenges and approaches to a viable campus security solution Making a detailed plan as per infrastructure/ campus requirements Making the plan fit into the budgetary limitations. This will be the biggest challenge as some compromises will have to be made. Selection of network, access control and other peripheral device vendors, and finally the software that unifies all these diverse components. A network vendor provides a Network OS responsible for the security and management of various network components. A video management system (VMS) provides the other backbone software around which all other PoE driven devices are connected to. This becomes very critical as the VMS can be looked upon as the other OS which acts as a unifying piece of software. Together the ‘network OS’ and the ‘VMS OS’ constitute the bulk of the software with a communication channel between them. The VMS software must be enterprise class with built in video analytics plus it must have the ability to connect to all the peripheral access devices through an application programming interface (API) and software development kits (SDKs). The VMS software must have the ability to support several types of IP cameras as well as provide an easy and quick path to integration for all other peripheral access devices. The illustration above is to depict the critical role the VMS plays in a security system. It is the key backbone software that talks to all other peripheral access systems software. In the above example we have shown automatic license plate recognition along with under vehicle surveillance system at the key entry points into a campus. The VMS in the above case also integrates an existing visitor management system but now enhances it with video and facial recognition. The campus shown is connected through the cloud to other campuses. The cloud component allows remote management and control, and has access to machine learning and artificial intelligence, and machine learning components of Azure/ WATSON. Any cloud service could be used…

Read More