securitylinkindia

Leading Video Surveillance Warranty

New warranty extensions bring IDIS product guarantees to as many as seven years As part of the global surveillance powerhouse’s year-long 20th anniversary celebration, IDIS announced an industry-leading ‘IDIS Ultimate Warranty.’ In a landscape with average industry warranties ranging from three to five years, the new IDIS Ultimate Warranty extends the company’s standard warranties for recorders from three to five years, while adding additional extensions of the manufacturer’s guarantees for its latest-generation technologies by two years, bringing the warranty for IDIS’s H.265 network video recorders (NVRs) and multi-format HD-TVI IDIS DirectCX TVRs to an unprecedented seven years. (IDIS cameras eligible for the two-year extension will see their guarantees extend to five years.) The IDIS Ultimate Warranty gives IDIS integrators and installers a clear competitive advantage and delivers increased peace of mind with a lower cost of ownership to end users. The IDIS Ultimate Warranty is also particularly competitive when compared to PC-based solutions that typically handle up to 64 channels, which have a maximum warranty of three years, forcing end users to purchase additional warranty long before the end of the lifecycle of their surveillance solution. A recent survey conducted by IFSEC Global shows that most organizations look to upgrade surveillance systems after five to seven years. With the IDIS Ultimate Warranty, end users can be confident that their IDIS solution will be supported for its entire life cycle, a demonstration of IDIS’s confidence in its industry-leading quality and reliability. Andrew Myung, President of IDIS America, noted, “IDIS has a long reputation for bringing new and innovative products to market. Each time we do, we guarantee that each element has been designed and manufactured in-house by IDIS with quality and reliability at the forefront. We’re proud to still have IDIS DVRs in operation after more than 13 years and that they have required little to no maintenance. It’s because of our confidence in this quality and reliability that the IDIS Ultimate Warranty is a natural step. It was not a difficult choice to extend guarantees for our recorders to as many as seven years as our confidence in our products and track record as a manufacturer fully support such a move.” The IDIS Ultimate Warranty will apply to products shipped globally from July 2017 and is expected to be fully available on all covered products in the Americas by early fall.

Read More

OEM Agreement

Pivot3 recently announced a strategic original equipment manufacturer (OEM) relationship with Intelligent Security Systems (ISS), an innovator in the development of advanced video management and video analytics software. Under the agreement, ISS will license the Pivot3 hyper-converged infrastructure (HCI) platform and integrate it with ISS video management software (VMS) to supply more robust security intelligence and video storage options to customers. The addition of Pivot3 HCI solutions, which are optimized for the write-intensive demands of video surveillance workloads, is a natural complement to ISS video surveillance technologies. The ISS framework manages and monitors an unlimited number of cameras and devices, applies intelligent video analytics and integrates a variety of disparate systems into one centralized interface. This approach allows users to leverage video data to achieve new levels of security intelligence and situational awareness. Through its partnership with Pivot3, ISS will provide tailor made solutions as well as enterprise-class video analytics in a scalable architecture that is easy to deploy and simple to manage. The platform’s architecture is optimized for IP video to prevent video loss and image quality degradation. Pivot3’s highly available software-defined storage technology ensures previously recorded video remains accessible even if entire appliances go offline. This extreme resiliency ensures critical data is protected and available for security, liability, business intelligence and risk management requirements. Additionally, systems can easily be expanded as needs grow without disrupting operations, while other applications, such as access control, visitor management and video analytics, can be consolidated on the Pivot3 system to further reduce costs and improve reliability. “We are pleased to associate our name with Pivot3, which has redefined the video storage space over the past 10 years,” said Cody Flood, VP Sales – North America, ISS, “We see this partnership as an opportunity for both companies to deliver robust video surveillance infrastructures, allowing modern businesses to experience close integration of industry-leading applications.” “This initiative is a strong complement to our existing channel strategy because it allows us to establish greater market presence across the globe,” said Brandon Reich, General Manager, Surveillance, Pivot3, “With ISS, we gain a strong partner within the surveillance industry that produces comprehensive video solutions and now provides the benefits of HCI to its growing global customer base.”

Read More

OnSSI Integrates with Improves Perimeter Surveillance Effectiveness

End-to-end solution/ camera/ VMS solution enhances threat detection capability OnSSI’s partnering initiative with Jemez Technology makes perimeter video surveillance solutions employing AXIS cameras even more effective in protecting critical assets and infrastructure. The Ocularis 5 VMS platform’s open architecture enables integration with the Jemez Eagle-i Edge® solution and AXIS cameras to deliver a complete end-to-end solution. “The integration of Ocularis with Jemez software is a best-in-class fit for security management tasked with securing wide-area, long-range environments,” said Mulli Diamant, VP of International Business Development, OnSSI, “OnSSI’s ability to embrace technology innovations from other leading manufacturers is an important factor in our continued ability to deliver cutting-edge VMS solutions for professional security applications and beyond.” Jemez Technology, established by former engineers and scientists from the Los Alamos National Laboratory (LANL), provides advanced area and perimeter surveillance solutions for corporate and homeland security, with emphasis on critical asset and infrastructure protection. The company’s Eagle-i Edge on-camera analytics platform, specifically designed and optimized for AXIS camera networks, integrates with OnSSI solutions to significantly improve threat detection capability and lower operational costs. “The integration of our Eagle-i Edge platform with Ocularis optimizes system efficiency and performance,” said Ted Turner, Director of Global Sales, Jemez Technology, “Now, end users have improved management of high risk surveillance data with capabilities that enhance agility and control.” Ocularis 5 offers a unique combination of enhanced features, recording versatility, robust data security, and overall stability that transcend conventional VMS solutions. Recent additions to the Ocularis 5 platform include: an auto-updating feature like those available on most smartphones and tablets; Smart Camera Driver technology that provides out-of-the-box support for newly introduced cameras from industry-leading camera manufacturers; camera mapping via GPS on Ocularis Maps; and a new Mobile app that enables the streaming of live video from Android smartphones and devices to and from the Ocularis 5 VMS. Ocularis is offered in three models: Professional, designed for organizations operating multiple locations with small to mid-sized camera counts; Enterprise, built for a wide range of mid to large IT-centric organizations; and Ultimate, created for large organizations with extended command and control needs and recording server failover.

Read More

Alerts Partners Encrypt Wireless Access Control Systems

Court rules against wireless system provider whose security systems were vulnerable to hacking because of no encryption Farpointe Data alerts its access control manufacturer, distributor, integrator, dealer and specifier partners about the potential impact on their businesses of the settlement of Edenborough v. ADT LLC case in the U.S. District Court for the Northern District of California. Referred to as the ADT Hacking Vulnerability Class Action Lawsuit, ADT will pay $16 million to settle five hacking vulnerability class actions because of claims that ADT’s wireless security systems were vulnerable to hacking because ADT failed to include any encryption within them. “This settlement comes on top of the U.S. Federal Trade Commission, through court actions, holding Wyndham Worldwide, a hotel chain, and D-Link, a wireless router and IP camera manufacturer, responsible for failing to implement good cybersecurity practices,” emphasizes Scott Lindley, Farpointe Data President, “It’s become very clear. If you are involved in any type of security, including electronic access control equipment, you can be liable if you don’t provide adequate cybersecurity safeguards. That includes encryption which is readily available.” “All modern contactless smart card credentials support cryptography but legacy credential technology may not. Look for terms such as 3DES, AES (which the government uses to protect classified information), TEA and RSA.” Security professionals should always consider more secure 13.56 MHz smart credentials over 125 KHz proximity cards. ‘Mifare,’ a technology from NXP Semiconductors, is a leading brand of contactless smart IC. The newest Mifare standard, DESFire EV1, includes a cryptographic module on the card, adding an additional layer of encryption to the card/ reader transaction. DESFire EV1 protection is especially important for customers wanting to use secure multiapplication cards for access management, public transportation or closed-loop e-payment. Another valuable option is Valid ID, an anti-tamper feature for contactless smartcard readers, cards and tags. Embedded, it adds yet an additional layer of authentication and integrity assurance to traditional Mifare smartcards. Valid ID helps verify that sensitive access data programmed to a card or tag is indeed genuine and not counterfeit. “Whether you need to guard against state sponsored terrorists or the neighbourhood teen from hacking the electronic access control systems that you implement and use, security today starts with encryption,” warns Lindley, “But, that’s just a beginning. To take steps that will further hinder hackers, ask for your manufacturer’s Cybersecurity Vulnerability Checklist.”

Read More

Qognify & BOSCH Expand Cooperation

Deliver a New Level of Interoperable Solutions The integration provides centralized control and management through Situator and VisionHub, including advanced video management capabilities, network optimization and video analytics support Qognify expanded the integration of Bosch network video security cameras and Qognify’s Situator and VisionHub, providing customers unique advanced technology and business benefits. This best-of-breed solution creates centralized management for the entire platform with direct integration of Bosch cameras to Situator (Situation Management/ PSIM) and VisionHub (Video Management System). The integration enhances security management and operational benefits by leveraging situation management, video and visualization capabilities. Centralized control and management through Situator (Direct integration between Bosch’s network video security cameras and Situator): The integration enables PTZ and PTZ-like control for moving and fixed cameras, automatic triggering of processes when predefined incidents occur based on pre-defined alarm rules using camera built-in video analytics, playback via local camera storage and camera tampering detection. Advanced video management capabilities via Qognify VisionHub, including: o             Dewarping: The advanced integration of Bosch’s FLEXIDOME IP panoramic 7000 camera and Qognify’s VMS, eliminates the fish eye lens distortion, enabling 360° of view, without blind spots, with an undistorted overview image. Additionally, the PTZ-like control of the video lets customers digitally pan-tilt-zoom to focus on details without losing the bigger picture. This advance support of dewarping means empowering the benefit from wide coverage using a single device, while having a ‘normal’ view of an otherwise distorted or reversed image. Qognify records the original camera stream and de-warps the video for viewing purposes, enabling each operator a unique view. o             Reduced storage and network bandwidth with VisionHub: Bosch Intelligent Dynamic Noise Reduction, a feature that optimizes storage capacity and reduces network strain by using bandwidth only when needed. By intelligently distinguishing between noise and relevant information Intelligent Dynamic Noise Reduction reduces the camera’s bitrate by up to 50% substantially contributing to a lower total cost of ownership (TCO). o             Network optimization: Overcoming network overload during working hours by automated, scheduled transfer from the camera onboard storage to the center. o             Zero-loss-of-data: automatic filling of missing recording data on the SVR by restoring missing video from the camera onboard storage. o             Video Analytics at the Edge: Qognify’s VisionHub integrates with Bosch’s Essential Video Analytics or Intelligent Video Analytics which runs on the camera. This enables delivering of video analytics alarms based on pre-definable alarm rules from the camera to VisionHub and Situator. In addition, the integration supports the Qognify video analytics suite running centrally on the recorder, combining Bosch built-in (edge) video analytics with Qognify’s server-based video analytics, offering customers maximum flexibility when designing a video analytics solution. “When mission-critical solutions are involved, it is essential that stringent quality checks are taken. Qognify’s solutions were tested to excel in multiple integrations,” said Rudolf Spielberger, Head of the Integration Partner Program at Bosch Security Systems, “Our strategic cooperation with Qognify is substantially enhancing the levels of security and delivering clear and quantifiable business advantages to our customers.” The certified integration is already in use at customers’ sites. “We are committed to advancing integration with leading technology partners and are proud of our integration with Bosch to yield a complete, tested and field-proven solution,” said Eran Noam, VP Global Strategic Partnerships of Qognify, “It’s important that organizations have confidence in integrations so they can leverage the broad range of excellent, integrated products in today’s security marketplace.”

Read More

Genetec Awarded

Genetec wins 2017 Microsoft Public Safety and National Security, and Canada Partner of the Year Awards. Company also recognized for its public-sector successes as finalist in the CityNext Award. Genetec Inc. has won the 2017 Microsoft Public Safety and National Security Award as well as the Canada Partner of the Year Award. Recognizing its successes in the public-sector, Genetec was also selected as a finalist in the Microsoft CityNext award. The award winners and finalists were selected from more than 2,800 nominations collected from 115 countries worldwide based on their commitment to customers, their solutions’ impact on the market and exemplary use of Microsoft technologies. Award winners and finalists from around the world were recognized at Microsoft Inspire that took place July 9-13, 2017, in Washington, D.C. Using Microsoft Azure, Genetec has developed solutions that are designed to build ties between the public and private sector, and encourage community-driven solutions that enhance public safety and livability. Used successfully in many cities around the world including Detroit, MI, Atlanta, GA and Campinas in Brazil, Genetec solutions powered by Azure allow members of a community to participate and work towards common goals such as public safety, economic growth and operational efficiency. “From the beginning, Microsoft and Genetec have shared a similar vision of the Cloud and its ability to deliver significant innovation such as big data analytics and machine learning. Today, the cloud is the foundation that enables enterprise, small and medium size businesses, educational institutions, and entire cities to build safe, resilient, and vibrant communities,” said Christian Morin, Vice President of Cloud Services at Genetec Inc. Ron Huddleston, Corporate Vice President, One Commercial Partner, Microsoft Corp. said, “We are honoured to recognize Genetec as the Canada Partner of the Year, and with the Microsoft Public Safety and National Security awards. Genetec is a prime example of the expertise and innovation we see in our Microsoft partner community to deliver transformative solutions.”

Read More

Canon Launches ARCUS Global Inc.

Building Leadership in Enterprise Level Video Cloud IoT as a Service Business is a spin-off from Milestone Systems and based in California Canon has recently launched a new Video Cloud IoT as a Service business based in California called ARCUS Global Inc. Owned by Canon Europe and built on the intellectual property, technology and expertise of Canon Group company and Milestone Systems, ARCUS Global Inc. will address the significant unmet global market demand from large enterprises for Video Cloud IoT as a Service for security and business optimisation. Rokus van Iperen, President & CEO, Canon Europe, Middle East & Africa, said, “We have identified network visual solutions (NVS) as a key pillar of Canon’s future growth and have already made important steps in this space including the acquisitions of Milestone Systems and Axis Communications. Our investment in ARCUS Global Inc. is the latest demonstration of our commitment and strategy to strengthen our position in this rapidly developing market.” Lars Thinggaard, President & CEO, Milestone Systems said, “We are proud to deliver the technology and know-how that ARCUS Global Inc. will use as their foundation. The spin-off allows us to continue to grow Milestone’s leadership position within on premise and private cloud video management solutions, where we continue to increase our investments.” Lars Nordenlund Friis, CEO of ARCUS Global Inc. said, “We are excited to launch our new company today and to introduce Video Cloud IoT as a Service not currently offered to the global enterprise market. We have a clear competitive advantage by drawing on the strengths of Milestone Systems and partnering with global leaders in public cloud infrastructure and IT technology. To maximise that advantage, we’re basing ourselves in California and we are now on a major recruitment drive to bring new highly-skilled employees into the business.” The new company will target an addressable global public cloud video management services market that is estimated to be worth between $10 & $20 billion by 2021.

Read More

Global Professional Video Surveillance Market

Growth Remained Low in 2016 The world market for professional video surveillance equipment grew by 3.9 percent in 2016. This is according to recently-published estimates from IHS Markit through its Video Surveillance Intelligence Service. This is a higher rate of growth than in 2015 (1.9 percent), but still low by historical standards. Accounting for over 40 percent of global revenues measured in U.S. dollars, the Chinese market grew by 7.2 percent in 2016. However, exchange rate changes did play a role in supressing a higher calculated growth in that currency (as the average annual exchange rate of the Chinese Yuan Renminbi to the U.S. dollar fell by 6.6 percent in 2016). The world market excluding China grew by just 1.6 percent in 2016. Demand for security cameras grew rapidly but prices fell considerably, affecting revenues. In fact, revenues declined in a number of countries. IHS Markit has just added new global and regional market statistics, forecasts and market share estimates to its Video Surveillance Intelligence Service. In addition to the above, key findings include: Slightly higher growth in the global market is forecast for 2017, at 5.5 percent. As a result, the world market will be worth $16.2 billion in 2017. The supply base for professional video surveillance equipment is gradually becoming more concentrated (although it remains highly fragmented compared with supply to many other markets). The top fifteen vendors accounted 58 percent of revenues in 2016. In 2016, a number of Chinese vendors continued to gain market share rapidly in regions outside China. They tend to offer products with low prices and this has been a major factor in average price erosion in those regions. 59% of all security cameras shipped in 2016 were network cameras. Shipments of HD CCTV cameras more than doubled. Less than 1 percent of network cameras shipped were 4K-compliant.     By Jon Cropley – Principal Analyst for Video Surveillance at IHS Markit  

Read More

Profile A & Release Candidate for Profile T

Profile A for broader access control configuration, and Release Candidate for Profile T for advanced video streaming Profile A ONVIF®, the leading global standardization initiative for IP-based physical security products, has made the final release of Profile A for broader access control configuration that establishes a standardized interface for access control clients and expands the configuration options of ONVIF conformant access control systems. The release marks the first open specification that allows for the mixing and matching of access control devices and clients within a system, facilitating interoperability for multi-vendor projects. ONVIF Profile A encompasses daily access control functions for granting and revoking employee credentials, creating and updating schedules and making changes to access control privileges within the system. Profile A deepens interoperability within the access control market by increasing functionality and system management functions at the client level, enabling the configuration of credentialing, scheduling and access privileges through the Profile A-conformant client interface. “Profile A is a significant development for the market because it provides a pathway for integrating together access control panels and hardware with management software from different manufacturers,” said Per Björkdahl, ONVIF Steering Committee Chair, “This pathway for integration also provides future-proofing of an access control system, as it allows another manufacturer’s access control management software to be installed in the future, eliminating the need for a hardware ‘rip and replace’ scenario.” The interoperability established by Profile A allows end users and system integrators to make hardware and software choices based on functionality and performance, and will also bridge the gap between legacy hardware and new software if both are Profile A conformant. The new Profile further enables integration between access control and IP video management systems when combined with ONVIF Profile C for basic access control and Profile S for video streaming. Profile A has been available in release candidate status in order to provide industry review and feedback prior to the final release. ONVIF circulates a new profile first as a ‘Release Candidate’ for at least 6 months, allowing members and stakeholders a final implementation review. When that process is complete, the final profile is published and members can test their products for conformance to the final version of an ONVIF Profile. This process is intended to allow members to more quickly introduce conformant products when the final version of a Profile is released. Profile T The Release Candidate for Profile T is a draft specification with advanced streaming capabilities that includes support for H.265 video compression and an expanded feature set that extends the capabilities of ONVIF video Profiles for systems integrators and end users. ONVIF Profile T for advanced streaming employs a new media service that enables the support of High Efficiency Video Coding (HEVC), based on the international H.265 video compression standard that specifies how to decode data into displayable video. Profile T-conformant clients support both H.264 and H.265 video compression, while Profile T-conformant devices support at least one of these formats. The new Profile also encompasses Transport Layer Security (TLS) enabled communications and new functionalities such as bidirectional audio streaming, standardization of events, imaging configuration, on screen display configuration, and more. “Profile T broadens the scope of the ONVIF video profile to include both the H.264 video compression standard that is widely used in video surveillance solutions today and H.265 video compression, which is set to become the defacto video compression standard in the very near future,” said Fredrik Svensson, ONVIF Profile T Working Group Chair, “In addition to support for multiple video compression types, Profile T establishes conformance regarding motion detection, metadata streaming, analytics and other important features that ultimately offer an expanded, standardized feature set to system integrators and end users, in addition to interoperability between manufacturers’ solutions.” Profile T for advanced streaming supports transport over Websockets, which allows end users to stream video to a browser instead of a VMS client. Profile T also features bidirectional audio that is often used in city surveillance, transportation and parking security, and for other security applications that require two-way audio communication. Support for the TLS protocol adds another level of security to communications between Profile T-conformant clients and devices. Standardization of events such as motion detection and tampering is included in Profile T. Digital input and relay output events are covered, as is their configuration through the device I/O service, which can expedite installation. Profile T allows motion region detector configuration through the analytics service, which means a specific area of an image can be selected for analysis. Streaming of metadata such as events and analytics data, is covered by Profile T as well.

Read More

Safe, Trusted, and Easy-to-use IoT Devices

STMicroelectronics and Security Platform Inc., a Korea-based technology innovator enabling trusted connectivity for the Internet of Things (IoT), are bringing robust, efficient, and easyto-use security solutions to IoT devices. The IoT comprises potentially billions of tiny, connected, embedded computing devices to help manage services and infrastructure automatically. The devices communicate through the Internet and share data with the Cloud, and so need strong but lightweight and convenient security to prevent cyber-attackers intercepting sensitive information or infecting connected devices with malware. Trusted computing helps keep networks safe by combining specially designed secure ICs and software that help check the integrity and verify the credentials of any device that is connected or attempts to connect. ST and Security Platform are working to simplify implementation of highly secure IoT devices, leveraging Trusted Computing principles. “Working with Security Platform, we aim to solve all the hardware-software integration challenges, providing a seamless path for IoT-device makers to implement best-in-class security for smart connected devices,” said Laurent Degauque, Secure Microcontrollers Division (SMD) Marketing Director, STMicroelectronics, “Our STSAFE-TPM Trusted Platform Module is proven, reliable, certified to international security standards, and provides the perfect foundation for this objective.” “The embedded-security software technology from Security Platform  makes it possible to embed light yet powerful protection features into lightweight IoT devices with limited resources at the manufacturing stage,” said Suik Hwang, CEO of Security Platform, “The integration with STSAFE-TPM from a leading Secure MCU provider ST helped us create a total security solution that enables devices to be intrinsically resistant to cyber-attacks to ensure the safety and success of the IoT.” ST’s STSAFE-TPM is a Trusted Platform Module that provides secure storage for data such as cryptographic keys needed to authenticate the system, using proven techniques such as antitamper, memory protection, and datawatching prevention. It meets industryrecognized security standards including Trusted Computing Group (TCG) TPM 1.2 and TPM 2.0 protection profiles, ITsecurity Common Criteria Level 4+ (CC EAL4+) certification, and US Federal Information Processing Standard (FIPS) 140-2. Using its Axio-OS secure operating system and Axio-RA remote-attestation verification solution, Security Platform checks for breaches of integrity by verifying the hash information of the device from a separate server. Together, these software modules also provide anticloning and anti-forgery protection, and process device authentication, message signing, and security update using only the appropriate signing code. While this collaboration will deliver a pre-integrated, ready-to-use solution, it builds on the existing independent STSAFE-TPM ICs and Axio-OS and AxioRA software the companies are already marketing and can help customers tie together. In these instances, Security Platform can supply Axio-OS and Axio-RA with a developer kit comprising a board and chipset to aid integration. STSAFE-TPMs are available within the larger STSAFE family of ICs from ST, which are tailored to support platform integrity, authentication, secure storage and other cryptographic services in various classes of connected devices from small IoT devices to industrial or consumer products, and desktop computers. Security Platform Inc. is a fast growing South Korean startup providing state-of-the-art hardware security for Internet of Things (IoT) devices. Collaborating with leading MCU and SoC partners to integrate its Axio solutions into the silicon layer, empowering and securing diverse IoT devices by antiforgery, anti-cloning and data protection features for trusted connectivity. Security Platform’s secure IoT development board, Axio-Builder enables IoT device manufacturers and developers to implement robust device security at a nominal cost, at ease leveraging its in-depth expertise of BSP, OS and cryptography technology.

Read More