Category: Feature
Asia-Pac MSSPs Need to Offer Advanced Analytics
Enterprises today are embarking on digital transformation projects at an ever increasing pace. As businesses leverage digital technologies such as cloud, data analytics and IoT among others, the need for cyber security becomes increasingly crucial to protect proprietary IP and private customer data. However, enterprises lack the in-house expertise to adequately manage cyber security while dealing in an increasingly advanced threat landscape, all while given less resources by management. This lack of talent and the constant push to meet regulatory compliance is driving the adoption of Managed Security Services (MSS) solutions. Traditional security monitoring is no longer sufficient because of limited log collection and rule-based analysis. As requirements mature, the limited log collection and rule-based analysis of traditional security monitoring is creating an urgent need for next-generation security solutions. In response, Managed Security Services Providers (MSSPs) have been introducing solutions that enable advanced detection, faster incident mitigation, global threat intelligence, and deep threat analytics. This shift in enterprise focus from device management to threat management is expected to drive the MSS market from US$1.97 billion in 2017 towards US$4.34 billion in 2022, at a Compound Annual Growth Rate (CAGR) of 17.1 percent. “MSSPs are investing in technologies such as anti-Distributed-Denial-of-Service (DDoS), advanced malware analysis, and advanced endpoint protection to deliver cloudbased security services,” said Kenny Yeo, Industry Principal and Head of the Asia Pacific Cyber Security Practice, “They are positioning themselves to deal with the shift in demand from point to integrated solutions, as the latter can provide comprehensive security and protect against multiple vulnerabilities.” Frost & Sullivan’s recent analysis, Asia-Pacific Managed Security Services Market, Forecast to 2022, covers the segments of hosted security services (HSS) and customer premises equipment based management monitoring services (MMS). It identifies the key services that had the highest adoption rates in the markets of Greater China Region (GCR), Japan, South Korea, India, ANZ, and across Southeast Asia. “Japan, Australia, and South Korea led the Asia Pacific market in 2017. The CPE-based MMS segment contributed 61.8 percent of the revenue, and recorded a year-on-year (YoY) growth rate of 6.6 percent. The remaining was generated by the HSS segment, which recorded a YoY growth of 9.3 percent,” noted Yeo. Successful vendors are expected to make the most of the additional growth opportunities by adopting a series of measures such as: Designing solutions that offer better security protection and risk management, with improved threat detection, response and management. Presenting a more holistic cybersecurity posture through MSSP advisory. Focusing on SMEs and enterprises with less-critical infrastructure and business services, as they are more likely to adopt HSS. Fostering an operating environment that will support the unique hybrid requirements of large mature customers. Expanding their portfolio to include advanced security services such as incident response, managed endpoint detection and response, management advanced threat detection, and user and entity behavior analytics (UEBA).
Avigilon’s Product Line up for GSX 2019
Avigilon Corporation, a Motorola Solutions company, is showcasing some of its latest and most innovative products and technologies at GSX 2019 during September 10 to 12, 2019 in Chicago, Illinois. Avigilon will showcase the next generation of video analytics, artificial intelligence, access control and cloud solutions, as well as some of the integrations with Motorola Solutions. Avigilon will be demonstrating how these latest technologies are redefining how customers consume data in order to help them gain actionable information. Through the power of cutting-edge video analytics and AI, these new products and technologies can help customers verify potentially critical events and act faster. Avigilon will preview its latest solutions including: The most advanced edition of Avigilon’s Control Center (ACC™) video management software featuring Focus of Attention – a new concept for live video monitoring, powered by AI. The H5A camera line – built with Avigilon’s next-generation of advanced video analytics with the ability to detect more objects with even greater accuracy. The latest updates to Avigilon Appearance Search™ technology, a sophisticated deep learning artificial intelligence (AI) search engine that sorts through hours of footage with ease. New exciting features will be released closer to the show. The latest version of Avigilon Blue™, a subscription-managed cloud video security platform that enables flexible site monitoring and utilizes analytics that provide important information about a site. Avigilon unusual motion detection (UMD) technology, an advanced AI technology designed to continuously learn what typical activity in the scene looks like and focus the operator’s attention on atypical events that may need further investigation. The new high resolution H4 Thermal camera which combines patented Avigilon technology with heat-sensing capabilities to improve perimeter security in areas with poor visibility, difficult lighting conditions and absolute darkness. The integration of Avigilon Control Center (ACC) video management software into Motorola Solutions’ CommandCentral Aware and Ally.
Sophos IT Managers are Inundated with Cyberattacks from All Directions and Struggling to Keep Up
Sophos has recently announced the findings of its global survey, ‘the Impossible Puzzle of Cybersecurity,’ which reveals IT managers are inundated with cyberattacks coming from all directions and are struggling to keep up due to a lack of security expertise, budget and up to date technology. The survey polled 3,100 IT decision makers from mid-sized businesses in the US, Canada, Mexico, Colombia, Brazil, UK, France, Germany, Australia, Japan, India and South Africa. Cybercriminals use multiple attack methods and payloads for maximum impact The Sophos survey shows how attack techniques are varied and often multi-staged, increasing the difficulty to defend networks. One in five IT managers surveyed didn’t know how they were breached, and the diversity of attack methods means no one defensive strategy is a silver bullet. “Cybercriminals are evolving their attack methods and often use multiple payloads to maximize profits. Software exploits were the initial point of entry in 23 percent of incidents, but they were also used in some fashion in 35 percent of all attacks, demonstrating how exploits are used at multiple stages of the attack chain,” said Chester Wisniewski, Principal Research Scientist, Sophos, “Organizations that are only patching externally facing high-risk servers are left vulnerable internally and cybercriminals are taking advantage of this and other security lapses.” The wide range, multiple stages and scale of today’s attacks are proving effective. For example, 53 percent of those who fell victim to a cyberattack were hit by a phishing email, and 30 percent by ransomware. Forty-one percent said they suffered a data breach. Weak links in security increasingly lead to supply chain compromises Based on the responses, it’s not surprising that 75 percent of IT managers consider software exploits, unpatched vulnerabilities and/ or zero-day threats as a top security risk. Fifty percent consider phishing a top security risk. Alarmingly, only 16 percent of IT managers consider supply chain a top security risk, exposing an additional weak spot that cybercriminals will likely add to their repertoire of attack vectors. “Cybercriminals are always looking for a way into an organization, and supply chain attacks are ranking higher now on their list of methods. IT managers should prioritize supply chain as a security risk, but don’t because they consider these attacks perpetrated by nation states on high profile targets. While it is true that nation states may have created the blueprints for these attacks, once these techniques are publicized, other cybercriminals often adopt them for their ingenuity and high success rate,” said Wisniewski, “Supply chain attacks are also an effective way for cybercriminals to carry out automated, active attacks, where they select a victim from a larger pool of prospects and then actively hack into that specific organization using hand-to-keyboard techniques and lateral movements to evade detection and reach their destination.” Lack of security expertise, budget and up to date technology According to the Sophos survey, IT managers reported that 26 percent of their team’s time is spent managing security, on average. Yet, 86 percent agree security expertise could be improved and 80 percent want a stronger team in place to detect, investigate and respond to security incidents. Recruiting talent is also an issue, with 79 percent saying that recruiting people with the cybersecurity skills they need is a challenge. Regarding budget, 66 percent said their organization’s cybersecurity budget (including people and technology) is below what it needs to be. Having current technology in place is another problem, with 75 percent agreeing that staying up to date with cybersecurity technology is a challenge for their organization. This lack of security expertise, budget and up to date technology indicates IT managers are struggling to respond to cyberattacks instead of proactively planning and handling what’s coming next. “Staying on top of where threats are coming from takes dedicated expertise, but IT managers often have a hard time finding the right talent, or don’t have a proper security system in place that allows them to respond quickly and efficiently to attacks,” said Wisniewski, “If organizations can adopt a security system with products that work together to share intelligence and automatically react to threats, then IT security teams can avoid the trap of perpetually catching up after yesterday’s attack and better defend against what’s going to happen tomorrow. Having a security ‘system’ in place helps alleviate the security skills gap IT managers are facing. It’s much more time and cost effective for businesses to grow their security maturity with simple to use tools that coordinate with each other across an entire estate.” Synchronized security solves the impossible puzzle of cybersecurity With cyberthreats coming from supply chain attacks, phishing emails, software exploits, vulnerabilities, insecure wireless networks, and much more, businesses need a security solution that helps them eliminate gaps and better identify previously unseen threats. Sophos Synchronized Security, a single integrated system, provides this much needed visibility to threats by integrating Sophos endpoint, network, mobile, Wi-Fi, and encryption products to share information in real-time and automatically respond to incidents.
7 Home Security Mistakes You Need to Avoid
Security is one aspect of our homes that we should never overlook. Instead, home security is something that we need to constantly evaluate and improve upon. There’s always an opportunity to improve the security of our homes; we just need to know where to look. Here are some common mistakes that homeowners commit when it comes to home security, as well as some tips to make sure your home is always secure and your family is always safe. Hiding a spare key outside This should go without saying, but you should never leave a spare key outside your home. Experienced home intruders will know all the common hiding places, so just avoid it altogether. If you absolutely need a backup plan to enter your home, consider giving a spare key to a trusted neighbour or purchasing smart door locks, which will allow you to remotely open your door, even if you can’t find your keys. Leaving doors and windows unlocked This may seem like a no-brainer, but there are many instances where you may forget to close and lock your doors or windows. For example, during a hot summer, you may decide to leave a few windows cracked while you’re out of the house. Or if you’re in a hurry, you might leave the house without locking the door. Leaving your doors and windows unlocked is an open invitation to home intruders, so always double-check them before leaving the house. If you decide to get smart locks, you can also use your smartphone to make sure your doors are locked while you’re away. Not securing your garage door I n addition to doors and windows, your garage is one of the most vulnerable areas of your home. Many garage doors are electronically controlled by universal remotes, which can be easily opened by other modified ones. To protect your property, never leave your garage-door opener in plain sight, and always secure your garage with a heavy-duty padlock or an automated garage-door lock, which will automatically lock your garage as soon as it closes. Having poor outdoor lighting A home invader wants to get in and out of your house as quickly and covertly as possible. Because of this, a home with a dark front or back garden will be their preferred target. Make sure there are no blind spots on the outside of your home. Get a light for your front porch that stays on all night, and place motion-activated floodlights around your property. Providing hiding spots for home intruders Thick shrubbery and tall plants are great ways to provide some extra privacy for you and your home. Unfortunately, they also provide great hiding spots for home intruders lurking in your garden. If your entire front garden is visible from the street, a home invader will most likely think twice before trying to break-in. If it’s possible, be sure to keep the plants in your garden trimmed and use accent lights and floodlights to expose dark areas. Posting your plans on social media You should never be too trustworthy of your ‘friends’ on social media. Globally, there are countless horror stories of people announcing their plans online and getting robbed by people in their social networks, so you always err on the side of caution. Wait until you return from your trip or event before talking about it on social media, and if you absolutely need to share your plans, do it with a private group of people you can trust. Having no security visible outside Savvy home invaders will know of all the latest security devices, and they’ll avoid homes if they know that they have effective security solutions in place. Sometimes, even just a security sign can deter a thief from breaking in, so get your devices set up, and make sure home intruders know that your home is protected. Some homeowners try to save money by mounting fake security cameras around the house, but experienced home intruders know all about the fake and ineffective devices you can buy. Home security is something you should never short-change, but there are ways to save money on effective home security solutions. With smart, Wi-Fi-connected security devices, you’ll always have home security at your fingertips, and you can respond to and prevent suspicious activity as it happens. By Mohammad Meraj Hoda Vice President of Business Development Middle East & Africa at Ring
Blockchain Technology Provides Biometric Technology Vendors an Edge
Biometrics to find high-growth opportunities in border control Rising consumer demand for convenience without compromising security is driving companies to adopt biometric technologies, propelling the $4.60 billion market toward $11.10 billion by 2023, at a compound annual growth rate of 19.3%. The proliferation of devices at the network’s edge and the rise of the Internet of Things (IoT) are creating a need for enhanced cybersecurity. In response, biometric companies are establishing new partnerships with blockchain technology companies to deliver identity management solutions. Meanwhile, the Biometric-as-a-Service business model is expected to gain considerable traction in both government and commercial applications. thentication. Artificial intelligence (AI) and machine learning will be increasingly used to complement biometrics and enhance security,” said Ram Ravi, Industry Analyst at Frost & Sullivan, “Besides, with smart connected devices shifting customer preferences towards alternate commerce channels, biometric market players are establishing a blockchain strategy to augment their offering.” Frost & Sullivan’s recent analysis, North American Biometrics Market, Forecast to 2023, covers the modalities of fingerprint, face, iris, vein, voice, and others. It presents the key growth drivers and restraints, the impact of micro and macro trends on the market, key competitors and their offerings, as well as the strategies that they need to adopt. The study examines the application sectors of government (border control, law enforcement, e-ID) and commercial (physical access control, logical access control, surveillance). “Biometrics has been gaining prominence in border control since 2017, with facial recognition showing potential to become a ubiquitous modality,” noted Ravi, “Airports are witnessing increasing biometric deployments across the United States due to the government’s focus on border control. Biometrics usage in law enforcement is also anticipated to rise gradually.” Vendors can tap further growth opportunities by: Offering greater visibility, machine-to-machine connectivity, and real-time interaction between people and assets to make the most of the rise of connected healthcare. Collaborating and partnering with select blockchain vendors. Including an AI engine. Providing cloud-based services. Building in-house capabilities to offer as value additions. Fostering partnerships with AI vendors to cater to the changing customer environment.
The Evolution of Video Data Protection
Over the past year, we’ve been focusing on a lot of big buzzwords. Deep learning, artificial intelligence and cybersecurity are hot topics, and these trends undoubtedly define the current landscape. In today’s evolving business environment, none is more complex and challenging than cybersecurity. The growing number of cyber threats around the world has ensured that data security is a top concern for all types and sizes of organizations. It is more vital than ever to protect video and corporate data to ensure critical data is secure and safeguarded from unauthorized use. In addition to protecting IT assets, video data requires stringent logical and physical protection to ensure compliance and reduce unauthorized breaches. When seeking to ensure the protection of critical data, the first step of any effort should be the deployment of an infrastructure solution that can provide the highest levels of performance, resiliency and availability so that video data is stored without loss, protected from any failures, and always available when and where it is needed most. But ensuring data is protected from all sources is critical. A threat could enter from anywhere in an organization’s ecosystem and regardless of the nature of the attack, the cyber criminal’s goal is to exploit vulnerabilities quickly and profit from them. Therefore, the industry needs to ensure that it provides products and services that deliver resilient protection methods, align with current IT processes, and reduce the opportunity for exploitation. Below, we take a look at the ways in which companies are taking proactive measures to ensure robust levels of cybersecurity from point of manufacture to deployment. A changing tide With so much data to be protected, security leaders need to evaluate not only how to store video data but how to secure it along with its entire video surveillance ecosystem. In the past, this meant making sure that physical security processes were aligned so that an individual could not physically tamper with a camera; however, now the focus has turned to IT processes ensuring that no one can access the camera and its data via the network. This trend is quite a change from years past when cybersecurity wasn’t part of any physical security conversation. However, the adoption of IP connected devices made the cyberattack a genuine possibility. Additionally, cyber threats continue to increase and evolve in sophistication. The industry must stay proactive in its approach to mitigating these risks. Video surveillance is the first real IoT application, and in fact, connected cameras are ubiquitous. Since we have already seen the impact of unsecured IoT devices (the Mirai Botnet attack), there is a greater risk of additional vulnerabilities. Unforeseen risks could lead to more damaging attacks such as accessing or tampering with private video, controlling door locks and access control systems, disabling alarm systems, and more. The reality is that we continue to move toward a world of more interconnected devices and this will bring to light new cyber vulnerabilities. As security professionals, we are entrusted by our customers to provide secure products and guidelines to safeguard these products from potential hacking. By working together as an industry to provide a system that is rigid against cyber-attacks, we improve overall cyber protection, and this level of collaboration gains further importance going forward. A collaborative approach At Pivot3, we’ve looked carefully at how we can reduce network vulnerabilities. We’ve expanded our relationship with HyTrust, a leading data security vendor, to deliver secure and compliant video surveillance infrastructure solutions that ensure high levels of data protection. Through highly secure encryption and comprehensive role-based access control, HyTrust workload security solutions ensure the highest levels of data protection. Combined with Pivot3 HCI for video surveillance, we can deliver a video surveillance solution that meets the data security and compliance requirements of mission-critical environments. Let’s look at how these two functionalities can be used to protect video surveillance data: Encryption is typically a resource-intensive process that requires more powerful servers to maintain video performance, resulting in the need for customers to purchase additional costly hardware. By leveraging HyTrust’s software-based encryption, video system performance is maintained with nominal CPU overhead, eliminating additional hardware investments. Beyond encryption, HyTrust also provides a comprehensive feature set that secures all aspects of a video surveillance infrastructure. Role-based access control provided by HyTrust Cloud Control allows only authorized individuals to have control over system management, while forensic logging and auditing help achieve regulatory compliance. This is only an example of how we as a company are working to meet the cybersecurity needs of our customers. There are other solutions and processes to consider, and each security leader needs to evaluate what parameters work best for their environment. Regardless of the application, a secure, compliant video surveillance infrastructure enables organizations to maintain strict levels of cyber and physical security to ensure brand protection and data security, and that is our overall goal. By Brandon Reich – Vice President of IoT and Security for Pivot3
Where are the Opportunities for Non-Leading Safety Suppliers Amid the Global Economic Slowdown?
Leading automation suppliers often have long-term relationships with their customers. These customers tend to be experienced in automation systems and are highly educated about safety concepts. As a result, these companies demand more advanced safety services from their automation suppliers. For leading automation suppliers, safety services present the biggest growth opportunities. The innate advantage held by these leading manufacturers is not easy for non-leading safety focused suppliers to acquire. Their clients tend to be more price-sensitive and have lower demand for high-end safety services. Economic challenges bring fear – and opportunity I n late 2018, an economic slowdown was seen in almost all major economies. The automotive industry in China showed a decline in sales in the last quarter of 2018, highlighting the potential economic risk in Asia Pacific. Brexit, the Italian economic crisis and other political and economic uncertainties are leading to decreased gross domestic product (GDP) growth and reduced manufacturing capital investments. As a result of the global economic slowdown, many OEMs and end-users have become more cautious and are postponing investment decisions. The global risks may not affect the safety market immediately, but the fear is contagious and creates uncertainty. However, where there is a challenge, there is also an opportunity. The global economic slowdown represents a turning point wherein many non-leading suppliers can target more high-end products and solutions to build better brand images. Clients soon will require basic safety products to meet the regulatory demands. Meanwhile, most clients are postponing investments on advanced safety projects to eliminate the risk of further negative sales performance. However, in the long term, the highest growth and highest revenue opportunities will come from the advanced integrated safety solutions in accordance with the developments of the IIoT. This is the good time for non-leading safety suppliers to cultivate new clients and promote a positive brand image by introducing high-end safety solutions. Creating a progressive brand image could help those suppliers enter the high-end market to capture long-term opportunities Safety market opens up On the other hand, with the acceleration of IIoT and connectivity, the market is embracing open standards. The OPC Unified Architecture (UA) is a machine-to-machine communication protocol that’s gaining popularity. The protocol can enable users of independent platforms to run their solutions on any operating system, allowing more advanced systems to be compatible with earlier systems, as well as enabling easier configuration and maintenance. Open industrial communication provides the foundation for non-leading suppliers to compete with larger manufacturers. As the amount of data generated at the machine-level increases, the network architecture should grow and change. The capacity and performance of standard Ethernet and industrial Ethernet may not keep pace with evolving needs. Released in 2018, the OPC UA time-sensitive networking (TSN) provides a vendor-neutral communications infrastructure for industrial automation based on open standards. OPC UA maps to IEC TSN to enable real-time, or nearreal-time, communication between different machines, controllers, clouds and other information technology solutions. In less regulated countries with more open market cultures, OEMs and end-users are willing to accept new concepts and qualified products that have competitive prices. According to the latest IHS Markit Machinery Production Market Tracker, the total revenue of Chinese machinery production in 2018 was $525 billion. With such a huge market base, China is one of the most promising markets and highest growth opportunities for suppliers, especially in the safety market. The market is still developing and normalizing its safety standards. Chinese IIoT and big data policies generate new opportunities As a national strategy, big data will be supported by key policies during China’s 13th five-year plan period. Driven by the demands of the logistics and material handling industry, the big-data industry will witness an annual growth rate of over 100 percent, as intelligent logistics based on IIoT become commonplace, according to an estimate from the Chinese government. All foreign suppliers are being encouraged by the Chinese government to cooperate with local enterprises to realize the success of IIoT. For those non-leading safety suppliers, this is a good time to enter the Chinese market because it will be easier to establish relationships with local clients. China is still demanding more advanced automation and safety solutions to shift to high-end manufacturing. Currently, China mostly requires basic safety products – with the sales of these products outperforming advanced safety components. Over 60 percent of China’s users, which usually are small and medium enterprises (SMEs), require basic-function safety products. Safety relays, E-stop and interlock switches are popular among these Chinese clients. However, national strategies illustrate the huge long-term opportunities in advanced products. The strategies now undertaken by safety manufacturing companies will shape the market share structure during the next five to 10 years. When trying to capture the opportunities in China, non-leading suppliers must make a trade-off between stable revenues in short-term and high-growth during the long-term. Basic safety components include E-stops, safety interlock switches, safety relays, safety mats and safety drives. Advanced safety components include light curtains, laser scanners, safety I/Os and safety programmable logic controllers (PLCs). In conclusion, the demand for IIoT, big data and open industrial connectivity is creating the highest growth opportunities for non-leading suppliers. Within developing countries, non-leading suppliers can acquire more market share by educating potential customers on the importance of safety solutions and by providing lower priced safety products. By Jessica Nian Research Analyst, Manufacturing Technology
Gallagher Gives Security Customers Free Auditing Tool
Gallagher has recently released a cyber security auditing tool – and they’re giving it away to their customers for free. Gallagher’s Security Health Check (SHC) tool is designed to help Gallagher customers identify and understand potential vulnerabilities within their security system. Gallagher’s customers can use the SHC utility to run an automated check via their Gallagher Command Centre system at any time, reducing the time and expense of performing regular manual audits. SHC identifies system vulnerabilities, assesses the severity of the threat, and provides specific recommendations to mitigate the risk and ensure correct system configuration. It also provides a mechanism to compare against earlier audit results to ensure organisations can track improvement over time and better plan system upgrades. Gallagher dedicates significant resource to the research and development of cyber-secure solutions, and has a commitment to helping customers gain full visibility and a deep understanding of how their security system works. “We designed security health check to give sites ownership of the state of their system,” said Steve Bell, Chief Technology Officer at Gallagher, “Security risks and system vulnerabilities aren’t static, it’s important to us to promote and support a culture of ongoing improvement within our industry.” SHC proactively addresses the ever evolving threat of cyber-attack, while supporting sites to protect the data held within their access control system. “Security systems can be vulnerable to cyber attacks for a variety of reasons, and the consequences can be significant,” said Bell, “A cyber breach via security systems can potentially allow access to personal data, restricted areas and intellectual property; it could also lead to unauthorized control over HVAC, lighting and building systems in order to disrupt operations.” Gallagher believes that in today’s world of evolving threats, it’s no longer enough to supply the tools and walk away. As the leading security system manufacturer to offer a system audit tool of this kind, Gallagher hopes to inspire the security industry to become more transparent with its customers and empower them to better understand their vulnerabilities.
EZVIZ Products Offer Smart Living Solutions
EZVIZ, the leading brand of secure smart living, is a consumer business entity of Hikvision that uses technologies such as smart hardware and Internet cloud services to create an intelligent work and life for users. The secured environment enables people to enjoy a relaxed, comfortable and pleasurable life of technology in a safe, convenient and green living environment created by smart technology. EZVIZ provides intelligent products and services for residences, offices, shops, schools, hotels and other places of residence. At the same time, EZVIZ cloud open platform for interoperability is used to share cloud platform service capabilities of intelligent video with partners to jointly create an IoT cloud ecology. Next-generation smart surveillance cameras With the next-generation of indoor and outdoor smart surveillance cameras and intruder alarm systems, the EZVIZ range brings households into the realm of smart home solutions by making it easier for individuals to connect to everything happening in their life – all while ensuring their home is safe. The debut of EZVIZ products in the India market has enabled users to visually and seamlessly connect to their homes, families, friends, pets and loved ones. This is just their first step, and they have already planned to bring more and more exciting new smart home products and technology to India in near future. The smart products have all been created to provide peace of mind for users, while making them as easy as possible to use. The entire range is ideal for use in a number of settings such as in children’s rooms, to keep an eye on pets and by families with elderly relatives. However, the solutions also provide the perfect security for business premises. Wide range The company boasts a wide range of both indoor and outdoor Wi-Fi cameras available for personal and commercial purchase. Each high-quality camera comes with a huge list of features that really make them stand out above competitors. From crystal clear 720p-1080p imagery, IFTTT-compatible, cloud services to SD card storage options, all features enhance the excellence of the tech inside and create a truly unique set of security cameras. Smart home alarm kit The smart home alarm kit is the first smart home alarm system that adds another level of security and connectivity for users. It links flawlessly between existing indoor and outdoor Wi-Fi cameras, smart locks, garage doors and light bulbs. Once a sensor or detector is triggered, a linked EZVIZ camera will commence recording and send users a notification that they can click to see what triggered the alarm. All products are IFTTT compatible, and as a result, can work seamlessly with Amazon’s Alexa. Working with just one app, the hi-tech products offer the ideal solution for numerous applications around the home. Husky Air wall mounted Wi-Fi camera EZVIZ’s latest offering, the Husky Air, is an outdoor/ indoor all-in-one home security system that combines a full HD professional grade camera, smart siren, warning strobe light and on-board recording capability in one compact package. It has a proactive defence function that includes a 100dB siren and lamp to alert the intruder that have been spotted. The Husky Air motion detection sends on phone a live video feed of what’s going on outside. The Husky Air casing complements any décor, and can be installed outside of the front porch, over a driveway or near a gate. It’s dual outdoor antennas ensure a strong connection to a home’s Wi-Fi signal even at a distance. Its built-in waterproof microphone and speaker support two-way talk for convenient and secure communication. Homeowners can talk to a person outside even before they get close to the home’s entryway. They can tell a delivery driver to leave the package at the gate, or deter a prowler without putting them in physical proximity. C6CN- Ez360 pan tilt camera C6CN is a full HD Wi-Fi pan-tilt camera which can be used to watch over an entire space with its 360° field of view. Ez360 is a pan tilt camera which comes with a built-in motion detector and smart tracking that will follow any motion or subject in its field of view. When it detects a motion in its field of view, the C6CN smartly tracks its motion while sending an alert on the mobile with a real time image. The end-user can also change the direction of the camera using the mobile app. The motion of the camera can also be controlled remotely from the mobile using app. C1C camera The C1C is a sharp looking camera designed for simple and quick installation. With a wide angle view of 130°, the C1C’s super night vision safeguards every corner – even in places with lower illumination. Packed with a storage capability up to 256 GB, this camera ensures that there is storage available for a longer period. Like all other EZVIZ cameras, C1C also has motion detection alert and 2 way communication features. The strong magnetic base makes installation of the camera a child’s play. Just place it on the shelf or clamp it on the wall and get ready to go. C6P (ez360 Pano) The C6P (ez360 Pano) features a premium fisheye lens and 3-megapixel HDR sensor to support 360° omni directional monitoring with four viewing modes – panoramic, expanded, dual-split screen and quad-split screen. It is a panoramic Wi-Fi camera offering with complete coverage without any blind spots.
The Landscape of Residential Security in India
India has traditionally been a rural and agrarian society. Rapid urbanization of small towns and cities which were earlier just business centers has led to the rise of a large number of new metro and cosmopolitan cities. The technology driven solutions have now become the mainstay and USP of the concept of smart city in real estate industry. The residential societies which are like clusters of islands within a smart city have become laboratories for proliferation of such innovative technologies. The high tech residential societies within the smart city thrive and rest on tenets of continuous surveillance, monitoring, real time flow of information, and prompt response to ensure the security, safety and comfort of residents. Security indeed assumes the foremost functional criterion of these residential complexes as sustenance of any urban setup is impossible without robust security measures. To meet the challenges of growing crime and accelerating urbanization, residential societies have increasingly turned to intelligent management of security services. Connected systems that make use of new data sharing and gathering capabilities are accruing more flexibility, control and efficiency than ever before to RWAs and the service managers. Core of security in residential society It’s not the residential complexes only, the footprints of violence and breach of security are engulfing the canvas in an unprecedented manner everywhere – be it schools, shopping malls, metro, railways, business offices or hospitality sector. In this context, technology is a great ally to the security servers. It helps take the delinquent out of the shadows and assists in crime prevention and management of essential services. Lighting and monitoring cameras are indispensable allies in the fight against crime. The integration of technology is the key component that unites virtual reality cameras, artificial intelligence and lighting in the same equipment, and that has become the core of security and citizen engagement in every high tech residential society to subdue and defeat violence, crime, and other illegal activities besides managing services. The advent and rapid adoption of artificial intelligence (AI), IoT and shared data have turned out to be the biggest enabler to the concept of high tech residential societies. AI has empowered the security to automatically learn and detect crimes such as armed robbery, drug trafficking, bodily injury, graffiti, vandalism, parking in a prohibited place, theft of vehicles, and has equipped the RWAs with tools to manage the energy in terms of electricity, gas, water and waste. Thus the technology has provided incremental steps leading to the way we all live and work. Benefits of SaaS based security platform ● Residents get instant notifications on their mobile phones, whenever a visitor checks in against their flat. ● Guests can be pre-entered as visitors by residents allowing them easy access to the complex. ● Residents’ can alert security guards, family and neighbors during emergencies with a button click. ● Security analytics and reports with which the management committee, society manager gets real time insights on visitor data and trends, gets ability to check real time if set security processes are followed. ● Complete visitor management, domestic staff management, association staff attendance with evidence, smart ID for residents/ staff, panic alert for residents, material in/ out tracking (for example, water tanker/ diesel/ pump for repair), automatic gate pass printing – every aspect needed by modern apartment complexes for their security is being custom-built by gate keeper. Mobile access controls In the first half of 2019, we have seen unprecedented integrations into security systems. Examples include access control systems using biometrics such as face recognition systems, smart phones to grant entry, and autonomous robots roaming in lobbies and corridors after working hours. Mobile access controls have grown in popularity because of the personalized experience it offers to the tenants. Everybody is going to use and access this space at different times and different ways. You really have to make sure that you have the technology to support. If this is something that sounds like the right fit for your building, then make sure your facility has strong internet and cellphone signals. Consider boosting the cellphone signals in your area to ensure seamless connectivity across the cloud, Wi-Fi and cellular. Mobile access controls have grown in popularity because of the personalized experience it offers to the tenants. Everybody is going to use and access this space at different times and different ways. You really have to make sure that you have the technology to support. If this is something that sounds like the right fit for your building, then make sure your facility has strong internet and cellphone signals. Consider boosting the cellphone signals in your area to ensure seamless connectivity across the cloud, Wi-Fi and cellular. Access control systems have greatly evolved over the years – and some of the companies that produce them are taking advantage of the universality of the smartphone. Open path’s access control reader is such a device that allows tenants to use their smartphone to gain entry. The process is completely keyless and hands-free. Autonomous robots They might sound like the stuff of sci-fi movies, but mobile autonomous robots are becoming increasingly inexpensive and accessible. The biggest impediment to the robot as a security option is cultural. So, to make sure that people know what a robot is, what it can do, and how it benefits them is really important for installing these systems. Unlike cameras and access controls, having this mobile robot moving through the space is such a visible thing in your premises. It changes people’s behavior in the most exciting ways – the aim is to marry the best parts of the machine with the best parts of people. The intelligent security robots combine sophisticated sensors – including day-night cameras, thermal sensors and motion sensors – with the ability to connect remotely to a system specialist who appears via video chat. That allows someone to gather information in context and provide that intelligence and insight to the authorities. An autonomous security robot can outperform static building infrastructure and complement any Internet…