securitylinkindia

CEM’s RED Compliant Access Control

Johnson Controls confirms that their powerful range of CEM Systems access control hardware is compliant with the European Union’s new Radio Equipment Directive (RED) 2014/ 53/ EU, which came into full effect on 13 June 2017. CEM Systems intelligent card readers including the CEM S610 (iCLASS SE, DESFire and Prox) reader, CEM S700 reader, CEM emerald reader and their biometric equivalents are all RED compliant and continue to be available for distribution within the EU. The CEM sPass reader and CEM S3040 portable reader are also confirmed as being RED compliant. On June 13, 2016, the former Directive on Radio and Telecommunications Terminal Equipment (also known as the R&TTE Directive, 1999/ 5/ EC) was repealed and the new requirements came into law. Manufacturers who were compliant with the existing legislation (R&TTED and LVD/ EMCD) had until 13 June 2017 to comply with the new ‘RED’ requirements. The Radio Equipment Directive applies to radio equipment being sold in the EU market and applies to all manner of products, including web enabled appliances, home monitoring medical devices, navigation or tracking systems and mobile phones to name just a few. Anything that uses the radio spectrum to communicate (apart from those items specifically excluded in the Directive) falls within the scope of the legislation and must comply. Equipment that does not comply with RED cannot be imported, distributed or represented in EU member states. In the age of the Internet of Things, more and more devices are transmitting and receiving data, and in effect, are behaving like radio equipment. It is important that radio products are ‘RED’ compliant to ensure the visibility of devices entering the market and to ensure that they do not present an interference risk to other electrical devices or a health and safety risk. CEM Systems access hardware has a legacy of innovation, with industry firsts including portable handheld card readers Power over Ethernet plus (PoE+) door controls and intelligent card readers with in-built memory.

Read More

Geutebruck Integrated Video Content Analysis

Geutebrück is expanding its portfolio with camera-based video content analysis (VCA). VCA reliably detects people, cars, trucks, animals, colors or behavior patterns in moving images – by day or night. Items such as containers, pallets or packages can be accurately identified. The video motion detection in the camera is activated by the customer. The main features are abandoned object (loitering items), removed object (missing items), counting (item counting), intrusion detection (perimeter security) and a dwell filter (loitering/ evaluation of dwell time). further filters are the speed filter (velocity), enter & exit filter (intrusion and leaving), stopping filter (immobility for too long) and tailgating filter (distance detection). Many of the filters can be logically sequenced together. Tamper detection (detection of tampering) and shake cancellation (image stabilizer) are also included. With item counting, the VCA camera automatically identifies in a direction-dependent way how many people, vehicles or objects cross over a counting line, which can be positioned anywhere in the image. To safeguard fenced outside areas, the intrusion detection detects any attempts to get through the barriers by means of determined perimeters and provides secure protection for goods which are stored outside and parked vehicles. The dwell filter identifies when people remain for an unusually long time in a defined area, for example outside a factory entrance/ exit or a financial institution.

Read More

S2 Cumulus Cloud-based Service

S2 Cumulus makes it easy to remotely monitor and administer S2 systems from a centralized dashboard. S2 Security, the leading developer of complete enterprise security solutions, has recently announced S2 Cumulus, a new cloud-based service. It is a major step in connecting the S2 ecosystem, enabling administration and monitoring of S2 products as well as critical communication between people, devices and third-party systems. “Cumulus represents an enormous advantage for S2 system owners,” said John L. Moss, CEO, S2 Security, “We’ve created the backbone for providing new cloud services to our integrators, our end users and our end users’ people.” S2 Cumulus transforms the way S2 systems integrators monitor and manage S2 deployments. At launch, S2 Cumulus offers system health monitoring, software license management, remote software updates and automatic alerts to changes in system status. Leveraging the cloud, S2 Cumulus will enable S2 Security to develop and provide countless services such as virtual credential acquisition and management, video stream sharing, remote mustering, communication with third-party systems and more. From a centralized, easy-to-use dashboard, integrators can organize and view critical information about their registered S2 systems to provide better service to customers. They can also set up and receive email or text message alerts to changes in system status, reducing the time to detect and resolve problems. In addition, common tasks such as updating software and managing and renewing licenses can be performed remotely through S2 Cumulus without requiring an onsite visit, reducing service and maintenance costs. S2 Cumulus currently supports S2 NetBox series access control and event monitoring systems, S2 NetVR series video management systems and the S2 Magic Monitor unified client, and over the course of 2018 will be offered for all S2 product lines.

Read More

RISC-Based Multi-WWAN Computers

One of the biggest challenges in modern rolling stock systems is establishing a solid and dependable communication network between a fast-moving train and the stations along the track. Wireless train-to-ground communication is the link that connects many advanced train services such as automatic train operation (ATO) and passenger Wi-Fi systems. In order to meet the stringent requirements of these systems, wireless devices must be able to consistently deliver reliable connectivity and sufficient bandwidth to support all the applications that count on train-to-ground communication systems. Moxa’s newly launched UC-8580 is a RISC-based multi-WWAN industrial computing platform designed specifically for seamless vehicle-to-ground communication. The UC-8580 is provided with four slots for installing wireless modules. Three slots support 3G/ LTE cellular modules, and one slot supports a Wi-Fi module. Each cellular module is provided with two SIM card slots to support redundant cellular network communication and geo-fencing SIM card selection, which you can implement by leveraging the built-in Wireless Manager, a Moxa software utility for cellular and Wi-Fi management. The UC-8580’s single-sided I/O design is ideal for space-limited vehicle applications. With its front-side access panel design, the computer allows for convenient installation and replacement of wireless modules, SIM cards, and mSATA cards without needing to unmount the entire unit from the wall, thereby simplifying maintenance. The UC-8580 uses an open platform based on Debian 8 with Linux Kernel 4.1, allowing solution providers to manage software packages via Debian’s APT, or develop software applications with Moxa’s API Library and GNU C Library.

Read More

CNL IPSecurityCenter™ V5.5

CNL Software has released IPSecurityCenter™ Version 5.5, which includes many performance and feature enhancements for large-scale and mission critical deployments of IPSecurityCenter for integrated, enterprise-wide situation management. As the size, scale, and complexity of IPSecurityCenter deployments continue to increase, so does its scalability, subsystem and sensor compatibility, and accessibility. Enterprise customers, in particular, require performance and reliability, the flexibility to efficiently integrate existing and new systems and technology, and the convenience that Web and mobile applications provide to help them effectively manage risk and enforce compliance across the enterprise. The latest version of IPSecurityCenter addresses a large number of PSIM system deployment challenges through features that include: Federated hub & node architecture: IPSecurityCenter’s federated architecture enables interoperability between and across independent and often geographically distributed IPSecurityCenter systems, delivering information about alarms and devices and controlled access to system assets and data for other federated members, while ensuring local availability for critical sites. Security policies and standard operating procedures (SOPs) are managed centrally and published instantly across the enterprise, ensuring incidents are quickly identified and properly and consistently resolved, limiting organizational liability and compliance risk and reducing administrative costs. Publishing: IPSecurityCenter is remotely deployable over regional, national, and global networks. New subsystem integrations, driver updates, and user interfaces are managed centrally, and published increasing conformity and reducing deployment and maintenance costs. Enhanced plug-in framework: IPSecurityCenter features an enhanced capability to support built for purpose ‘plug-ins’ that use modern development capabilities without requiring wholesale updates to the underlying framework, ensuring that end user interfaces are always 100% fit for the purpose. Maintenance management: IPSecurityCenter supports the health status and diagnosis of connected subsystem devices including CCTV cameras, access control equipment, vertical transportation systems, and supporting network and communications infrastructure. IPSecurityCenter also integrates with third-party service desk systems and supports the tracking and measurement of service level agreements. Integration of these technologies enables IPSecurityCenter to increase the uptime of connected systems and devices, enhances security posture, and reduces subsystem and equipment maintenance and sustainment costs. Image scroller: Presents event-driven visual information in real-time with a graphical indication of event status. This allows operators to rapidly process large volumes of data to support faster decision making. For example, the system can be used to present employee ID photographs as they enter critical areas, or license plate images for violating vehicles. Automated software upgrades: Lowers the total cost of IPSecurityCenter ownership by automatically delivering updated client software to each operator workstation computer, minimizing IT resource, administrative and maintenance and sustainment costs. Geographic data: Whether dealing with threats detected by sensors such as radar and sonar or to reduce the risks of lone workers in hazardous environments, IPSecurityCenter plots and tracks people, vehicles, vessels, and GIS-enabled devices, and displays current and historic information. Auditing and management data: IPSecurityCenter creates records of all operator activity to assist with regulatory compliance or corporate governance. This ensures that IPSecurityCenter can act as the single source of truth for all the connected sub-systems, reducing the time to access vital audit information. “In total IPSecurityCenter V5.5 represents over a years’ worth of development effort that has delivered a product that contains major new functional areas designed to address the business challenges encountered by IPSecurityCenter users every day,” says Dave Taylor, Chief Product Manager at CNL Software, “IPSecurityCenter is in use at over 400 sites around the world. We will continue to invest heavily in developing the features that are required to address the growing needs of our customers and partners.”

Read More

Pelco VideoXpert™

Professional VMS for SMB Applications Offers one-year ‘Control with Confidence’ free software license trial to users and integrators Implementing a professional Video Management System (VMS) for small and medium business (SMB) applications is now more convenient and economically practical with the introduction of VideoXpert™ Professional from Pelco by Schneider Electric. VideoXpert Professional is designed with easy plug-and-play installation, complete with IT-friendly Windows and an intuitive interface for ease of operation. To help catapult the launch, Pelco is offering an exclusive ‘Control with Confidence’ one-year, free software-only demo license to users and integrators for up to four channels. “VideoXpert Professional is a real game changer. It provides SMB users with the ability to easily control and manage surveillance cameras with advanced features and capabilities and exceptional cost efficiency. And it’s also designed for easy installation, so users can be up and running very quickly,” said Jonathan Farmer, Senior Product Manager, Pelco by Schneider Electric, “We’re so confident that VideoXpert Professional is the VMS solution that SMBs have been waiting for, we are launching it in conjunction with our unique ‘Control with Confidence’ free software-only demo licenses so they can experience it for themselves.” VideoXpert Professional bridges the gap between mid-market and enterprise-level VMS platforms. With a selection of servers designed to handle up to 100 cameras, it delivers a VMS solution that can be modularly scaled by adding VX Pro servers to meet future system expansion needs. With all essential functions on a single machine, easy access to actionable information, and pre-defined roles for easy user creation, VideoXpert Professional provides SMBs with extensive VMS capabilities. Featuring Dell hardware, the users will have the added benefit of leveraging Dell support tools and apps. Advanced features include hardware acceleration which allows users to more easily display high MP camera images; H.264 coding over WAN transport; anti-virus support on the ops center client; and simple export procedures that allow quick and easy hand-off of video data to law enforcement agencies. Another core feature of VideoXpert Professional is its extreme ease of installation, which can take place in well under 20 minutes – from unpacking to implementation – with little to no previous VMS experience required.

Read More

ITP Novex Hunting Miniature Tracking Units

I.T.P. Novex is a leading provider of miniature units that facilitate location tracking and audio monitoring within target vehicles and other objects such as parcels, vessels etc. organization’s agents on the field; and the organization’s vehicles. The command and control center allows monitoring and control of the tracking operations through several dedicated command stations from different locations simultaneously, enabling to display the location of the target tracked vehicles/ objects, the organization’s vehicles and the organization’s agents on the field on one screen. The command stations can be operated from PCs, tablets or smartphones. Remote monitoring and location tracking data are accessible from virtually anywhere in the world. Using a two-way communication method via cellular networks, using SMS and DATA communication, the system collects the real-time location data from the remote tracking devices based on their GPS location. The system utilizes the 2, 3 and 4G cellular networks around the globe, assuring fast, efficient, flexible, and inexpensive communication between the central command stations and the tracking devices. The system displays the real-time location of the various tracking devices on coloured digital maps and aerial photos allowing the collection of essential data regarding the real-time location of targets under surveillance, as well as learning their movement’s pattern. Case studies Suspicious delivery at the post office A customer received info that a package containing drugs was about to arrive at the post office sent from abroad by regular mail. Once the customer located the package, he covertly installed a tacking unit with a microphone within this package. The unit was so configured that it would only start transmitting when the package was picked up at the post office by the target. The moment the package was picked up, the customer received a motion start alarm and turned on the microphone by calling the unit. When the unit started transmitting, the customer had both the route from the post office to the shelter location, and the voice conversation of the targets from the moment of the pickup. The targets were arrested once they arrived at their shelter. The recording of the voice conversation between the targets was brought as evidence to their trial. Drugs shipment at the desert In this case, a customer received info that drug dealers were about to receive a huge shipment of drugs in a deserted area, right next to the border with another country. The drug dealers’ cars were much better equipped to drive through tough deserted areas than the customer’s cars, which prevented the customer’s cars to handle a car chase race against the dealer’s cars. Being that the case, the customer covertly installed a tracking unit below the target’s (drug dealers) car. Once the target had received the drug shipment; he drove into the middle of the desert where he knew there was no cellular reception and which made him wrongfully assume that he could not be traced, dug a hole in the ground and stored the drugs inside. However, the customer had configured the tracking unit to store locations to the internal log, so that once the dealer’s cars regained cellular reception, the log would send the logged locations to the customer’s command center, giving him the exact position of where the target had stored the drugs. Later on, the customer approached the said location and successfully located the said drugs. Terrorist attack operation A customer was following a terrorist threat. The customer had info of a certain terrorist attack that was about to take place in a specific location, but had no info as to when this attack would happen. One month later, the customer was able to successfully prevent this attack from happening. The customer used the tracking unit which has the ability to work for an extraordinary length of time at full capacity without even having to replace its internal battery or approach the target’s vehicle; therefore making it possible for the customer to be able to follow the target’s activities for a month leading up to the attack. Tactical mission in a foreign country A customer was deploying an ultra-sensitive tactical mission in a foreign country. The operation got complicated to the point where the customer’s agent on the field, who had a tracking unit with a microphone attached to his body, felt his life was in danger. The moment the agent pressed the panic bottom, the chief of the operations gave an immediate command for the backup team to intervene. This intervention might have saved the agent’s life. Tracking the customer’s cars A customer’s unit was deploying an operation that required its own cars to be traced. This operation also required the customer’s agents to change cars frequently; while, the operation’s commander (being on the field with his agents) and the customer’s chief (being at the headquarters) could keep track on their teams on the field. In order to ensure a smooth and efficient way of tracking and given that the agents had to change cars frequently; each team was provided with a tracking unit with powerful magnets. Each tracking unit could be easily and quickly covertly-installed, and later on removed, from any given car. Each time a team changed their car, they could remove the tracking unit from the old car and install it within the new one. The operation’s commander, being at the field, was able to follow up and get a complete picture of the deployment of his teams, utilizing his smartphone or his tablet, while the customer’s chief, being at the headquarters, could do the same utilizing his laptop or PC.

Read More

Next-Generation Software for Connected Solutions

Milestone Systems has recently released XProtect 2017 R2. They meet the increasing demand for connected business and video systems by releasing three new products – XProtect Essential+, XProtect Express+ and XProtect Professional+. These new products cover installations from a few to thousands of cameras. All the products fully support hardware acceleration, where system performance can be boosted just by adding a supported graphics card that can handle the heavy lifting in decoding video, leaving room for the system to handle other tasks. Expanding possibilities through connectivity Support for Milestone’s integration programming platform (MIP SDK) and built-in customization options with the rules engine enable tailored video solutions made by Milestone Partners. This could be video analytics or integrations to other systems like building management systems, financial systems or other enterprise systems. XProtect Express+ and XProtect Professional+ support Milestone Interconnect, enabling these systems to be part of a larger network of video business systems. These new products open new possibilities for the Milestone community because they enable video service solutions targeted to each customer’s needs. If the customer has the Milestone Care maintenance service, system performance monitoring can be handled online to give all the benefits of advanced video systems with full remote operation. “As the number one global VMS vendor, we are positioned to drive open platform innovation through the solution power of the Milestone community.  With these new products, we are giving our community a whole new range of possibilities. Milestone proactively designs for the market trends we see growing with networked systems,” says Bjørn Skou Eilertsen, Chief Technical Officer, Milestone Systems. New features in Milestone XProtect 2017 R2 As video management systems are becoming more business-critical; cybersecurity is a growing concern in today’s fast technology curve. The XProtect 2017 R2 update also includes several security enhancements for improved cybersecurity including securing the video recordings using strong encryption for the media database. The integrity of the recordings is ensured by digitally signing using SHA-2 (Secure Hash Algorithm 2), an important security standard. These new features support Milestone in meeting the highest security demands of customers. As part of the continued refining of Milestone’s software usability, audio functionality in XProtect has been enhanced. New features have also been added for handling maps to improve operational efficiency.

Read More

Adding HID Technology™ to the Reader Range

Paxton Access, the manufacturer of IP access control and door entry solutions, has added Genuine HID Technology™ to the majority of its access control reader range, in pursuit of market feedback. In addition, for extra convenience, dealers can now purchase nine of Paxton’s most popular readers with pre-activated HID Global® licenses included. These readers are ready to use right out of the box with no extra cost and no additional license required. Genuine HID Technology is one of the most popular credential formats and this update to the company’s reader range helps support the ease of system migration when updating to a new Paxton access control solution. This also provides a cost benefit as users can retain their existing credentials. Gareth O’Hara, Chief Sales Officer at Paxton Access says, “This is something that our customers have told us they want, and we have listened. With the release of this technology, taking over an existing system is even easier. Simply enrol your HID credential in the Paxton system and continue to use them alongside Paxton tokens without changing any hardware. This is great for sites already using this technology as your customers won’t need to buy new credentials, saving them money.”

Read More

Schlage® NDE Wireless Locks Integration

Integration offers users real-time monitoring capabilities using S2 NetBox access control system S2 Security, and Allegion™ have announced S2 NetBox series product support for Schlage® NDE wireless locks. S2 NetBox access control and event monitoring system users can now easily manage and control the locks using Allegion’s ENGAGE™ Gateway and Bluetooth® technology. “We’re excited to offer support for and sell the popular Schlage NDE wireless locks,” said Mike Riegelman, Vice President of Business Development at S2 Security, “NDE locksets, in particular, offer real-time lockdown capability, which is an advancement in wireless solutions.” The integration allows users to manage access control and event monitoring, such as real-time lockdowns, directly from S2 NetBox without requiring third-party hardware. The Schlage NDE combines the lock, credential reader, door position sensor and request to exit (REX) into a single unit. Ideal for interior doors, NDE wireless locks are simple to retrofit into standard doors without drilling additional holes. And, these locks connect directly to a smartphone for quick set up using the ENGAGE mobile app. “The integration with S2 NetBox brings new opportunities to both companies, and most importantly, to our customers,” said Brad Aikin, Electronics Portfolio Leader at Allegion, “The access control system seamlessly works with Schlage NDE locks to provide advanced security capabilities at every opening. Plus, customers enjoy many conveniences of using credentials throughout the building.” NetBox software Version 4.9.08 is now generally available for S2 Security Certified Integrators to download on S2 Support Central.

Read More