wp header logo 394

PSA announces new partnership with LandSkyAI | Security News – SourceSecurity.com

Local News MP News

Doorking ProxPlus™ Secure Card Readers
Vanderbilt Feenics Cloud-Based Enterprise Access Control Platform
Dahua DH-IPC-PFW5849-A180-E2-ASTE 2×4MP Full-Color Dual-Lens Splicing WizMind Network Camera
Anviz C2 Series biometric identification and RFID card access control & time attendance devices
Milestone Systems’ XProtect Video Management Software (VMS) offers enhanced security, safety, and efficiency for Jackson Hole Airport (JAC)
Pelco provides their VideoXpert VMS to enhance security operations at the Murtala Muhammed Airport Terminal Two in Nigeria
“Gate of Europe”: Integrating Como Docks with Dahua Intelligent Solution
Dahua highlights some of the campus applications of implementing AI technology in schools
Anatomy of a False Alarm
Making physical security a critical pillar of your cybersecurity strategy
Preventing Fan Violence: 7 Tips for Moving from Reactive to Proactive Security
Improving real-time visualisation and collaboration in SCADA Operations
Cybersecurity in the physical security world
RFID for GMP/GLP environments
Smart surveillance in the workplace
Improving City Mobility Using Connected Video Technology
18 Nov 2022
PSA, the world’s largest consortium of professional systems integrators, announces the addition of LandSkyAI, LLC to its lineup of technology partners. LandSkyAI provides innovative and reimagined solutions with autonomous robotics to optimise safety, security, and inspection processes.
LandSkyAI brings a new, cutting-edge offering to the PSA portfolio,” said Matt Barnette, CEO of PSA, adding “Solutions designed to leverage technology with minimal human intervention are critical to the future of the expanding security industry.”
LandSkyAI’s solutions add another layer of security and surveillance for businesses while acting as a force multiplier for their operations. It will expand the capabilities of standard video systems by providing a new stream of data that can be fully integrated into their video platforms. LandSkyAI can integrate with existing security sensors to create a truly automated security package.
The strong relationships PSA has with their innovative integrator base will allow LandSkyAI to work with some of the best in the industry. We are excited to help the integration community continue to evolve and grow by utilising autonomous drone and robotic solutions,” shared Jake Shild, CEO of LandSkyAI, adding “We are proud to be partnering with PSA, an industry leader, to broaden and diversify their solutions offered.”
e-con Systems introduces RouteCAM_CU20
Fibra Technology: How to install a wired security system in 6 hours
DKS: 1620 Lane Barrier Animation
Being isolated on the edge of wilderness means there’s a need for a video system that’s both reliable and flexible. For that reason, the team at Jackson Hole Airport (JAC) since 2009 has relied on video management software (VMS) from Milestone Systems to enhance security, safety, and efficiency. Challenge – Help to keep scaling At the edge of the frontier, Jackson Hole Airport has experienced considerable growth over the years. Significant capital investments in expansions have made new video system integrations possible several times, and Milestone XProtect has supported the airport’s needs along the way. As of 2020, over 220 cameras were in use, and the airport shows no signs of slowing down As of 2020, over 220 cameras were in use, and the airport shows no signs of slowing down. New projects will include building a fuel farm, a car wash and expanded parking facilities. XProtect’s open platform software As the need to increase security continues, XProtect’s open platform software will continue to enable both IT team growth and the seamless integration of new cameras and data storage capabilities. Solution – Integrations are in the fly zone Milestone XProtect Professional Plus and Smart Client Network cameras from Axis Communications and Panasonic Optimised video server hardware from Razberi Integrated video analytics from Agent Vi All video is stored for up to a full year, with most of the system’s 200 cameras set for motion recording, 24/7. Result – Greater situational awareness for higher security The video system has enabled improvements throughout the entire airport. For example, Jackson Hole Airport has to contend with a great deal of plane de-icing for several months each year. This occurs at a distance from the main buildings and, thanks to the video expansion, each airline is now able to monitor the de-icing of their planes. Allowing clients to monitor progress on their own has saved airport staff time and resources. The airport uses the system to closely monitor the security checkpoint, too, capturing video documentation in case of an incident. Baggage areas are also monitored, so it’s possible to investigate lost bags and left-behind items by reviewing video. New 4K, multi-sensor cameras New 4K, multi-sensor cameras support a largely unmanned investigatory system New 4K, multi-sensor cameras support a largely unmanned investigatory system. They capture everything and provide enough data to zoom in after the fact, if needed. Additionally, the team has deployed video analytics from Agent Vi to provide a layer of automated alarms and notifications for flagging abnormal occurrences. Video analytics can detect events, such as travelers moving against the foot traffic flow and crossing into restricted areas. Milestone’s XProtect Smart Client Milestone’s XProtect Smart Client has shifted general situational awareness in the airport, as a new standard for authorising users’ remote access to the surveillance from multiple locations. It provides seamless viewing of live and recorded video, instant control of cameras and connected security devices, and a comprehensive overview of activity. The ongoing use of Milestone Systems’ video management software (VMS) makes it possible to maintain the independence and efficiency of a small team of personnel, thereby delivering maximum security at the base of the Grand Teton Mountains. Situational awareness for the JAC team and their clients Andrew Wells, the IT Manager for the Jackson Hole Airport (JAC), said “Situational awareness for our team and our clients allows us to be as secure and efficient as possible with our small team. The flexibility of the open platform VMS allows us to scale our system and add the features we need now and in the future.” Jackson Hole Airport (JAC) lies seven miles north of Jackson, Wyoming, at the base of the Teton Mountains, in USA. It is unique for being entirely within Grand Teton National Park. It is the busiest airport in the US state of Wyoming, with nearly 500,000 in-bound passengers annually. The airport covers over 500 acres and has one runway that supports 11 hard-stands, nine boarding gates and three baggage carousels.
Murtala Muhammed Airport Terminal Two (MMA2) is Nigeria’s preeminent air terminal. In 10 years of operation, it has achieved its objective of becoming a world-class airport operator, setting new standards for the African aviation industry. As the country’s first and only privately-funded terminal, its unique structure, ultra-modern facility, world class terminals, customer service, safety, and security are celebrated in the industry. Three thousand passengers move through the terminal each day and it is a secure working environment for more than 2,000 people. Honoured multiple times Its 800-car multi-story Car Park (MSCP) is the first and largest in Lagos, Nigeria’s economic nerve centre and financial hub. The airport has been honoured multiple times; it was rated the best airport terminal in the country in 2014 by the Federal Ministry of Aviation; received the Most Functional Airport Terminal Award of 2016 by IFC International Limited, an aviation consulting firm; and named Nigerian Airport of the Year in 2017 by WorldStage Limited. Its 800-car multi-story Car Park (MSCP) is the first and largest in Lagos The airport is funded and operated by BiCourtney Aviation Services Limited under the PPP (public private partnership) concession agreement between the Nigerian federal government and Bi-Courtney. The terminal has been renovated several times over the years, and has become a benchmark for airport operations in Nigeria. One important component of this is the airport’s recently upgraded video security system, which modernised the earlier hybrid system. Video security system The airport’s earlier video security system was comprised of 60 Pelco analogue high-speed dome cameras, four Pelco hybrid video recorders, and a Pelco matrix/switcher controller. While still functional, the system could no longer meet either the safety and security challenges of the airport in a post 9/11 world, or Bi-Courtney’s long-term operational needs. Functionally, it was challenged by what was synonymous with typical analogue systems – low throughput, low resolution, low video retention, and limited storage. Added to this were the problems of decaying infrastructure, the high cost of maintenance, and incessant communication failures. To ensure that all bases were covered and their needs would be met, Bi-Courtney Aviation Services began the upgrade process by commissioning a consultant for a site survey and issuing an RFP. Baggage claim points As a local integrator and experienced Pelco channel partner, we met all of these objectives” Based on a number of factors including system design, product features, cost, local support capability, and experience, the bid was awarded to BOW Dynamic Systems Ltd. with a Pelco system design. According to A.O. (Adeniyi) Ajayi, Director, Operations and Engineering of BOW Dynamic Systems, airport management had one primary goal for the upgrade – to offer a safe, secure, and pleasant experience to passengers in all parts of the airport, from the parking lot to the lobby and check-in terminals, as well as baggage claim points, cargo areas, and apron. Finding the right technology partner was imperative to achieving this goal. “As a local integrator and experienced Pelco channel partner, we met all of these objectives,” said Otunba Ladi Animashaun, MD/CEO of BOW Dynamic System. “Our comprehensive understanding of the airport’s needs, combined with our deep knowledge and experience with Pelco products, gave us a competitive advantage over other local and international integrators.” Integrated analytics software At the core of the new system design is the Pelco open platform VideoXpert Video Management System (VMS), which is an upgrade from the previous Pelco Endura VMS. The VMS maintains the database of the newly installed Pelco cameras and recording devices as well as integrated analytics software. The VideoXpert platform enables the aggregation of the various systems into a single, intuitive user experience which is accessed through a convenient web interface for system navigation. The VMS maintains the database of the newly installed Pelco cameras and recording devices By unifying operational and security data via a single user interface, airport management has an intelligent end-to-end IP video solution for proactive response to situations within the terminal. “The benefit of VideoXpert goes well beyond the capabilities of the previous analogue environment. For instance, they can now see live video associated with any triggered alarm,” said Mr. Adetoye Adeyale, BOW Project Supervisor. On-board analytics capability “Essentially, it allows operators to better see what they need to see, when it’s needed, so they can make faster and more effective decisions that will help keep the airport safer and more secure.” The replacement video security cameras are another critical upgrade to the overall security of the airport with improved image quality, streaming, and on-board analytics capability. In total, 187 Pelco cameras comprising 21 different models are in use throughout the facility so that the best combination of technology, lenses, and other factors are used to meet the needs of each location. For outdoor security around the airport and in the airport lobby areas where the lighting conditions change throughout the day, BOW installed Pelco’s low-light Sarix cameras. Optera panoramic cameras High-resolution Spectra PTZ dome cameras are used in the parking structure High-resolution Spectra PTZ dome cameras are used in the parking structure, baggage claim points, cargo area, and other parts of the airport, so that in the event of an incident or alert, critical identifying features can be seen in HD detail. Optera panoramic cameras with PTZ capabilities provide additional situational awareness. Most of the cameras feature Pelco’s SureVision technology for improved Wide Dynamic Range (WDR) performance and Smart Compression technology for reduced bit rate usage and storage savings. According to Mr. Akeem Saliu, BOW Project Manager, the cameras’ suite of built-in analytics provides the airport’s security team with increased advantages that enable them to be more productive and ultimately enhance overall security of the airport and surrounding areas. He says, “In addition to conventional features such as motion detection or camera tampering, these intelligent cameras have advanced tracking capabilities.” Pedestrian traffic flow “For example, it’s possible for the system to alert security operators if a person enters a restricted area or walks against pedestrian traffic flow. The camera analytics can even recognise when a piece of luggage has been left unattended or an individual is loitering, and then notify security.” The VSM provides automatic distributed load balancing and active-active failover For video archiving where a minimum of six-months of video retention is required, BOW installed seven VSM servers for a total of 384 terabytes along with three storage pool devices on RAID 6. The VSM provides automatic distributed load balancing and active-active failover within a storage pool to ensure continued recording if catastrophic failure occurs. The design-build features two control centres; one for operations and one for security. Alert security operators The security centre has a video wall with six 55- inch screen monitors, as well as four 24-inch screen monitors dedicated for alarms, event management, and analytics reports, and two desktop screens for each of the two operator’s workstations. The operations centre focuses on apron activities, airfield, hangers, and takeoff and landing of the aircraft, and has two 46-inch screen monitors as well as two 24-inch screen monitors. Additionally, the operation centre client is utilised remotely by both the CEO and CSO; they can call on any camera for forensic purposes or for an overview of operations within the facility. Accommodating future growth The unrestricted architecture is designed to scale and accommodate future growth” “BOW’s network design, configured by certified CCIE personnel, features a star topology with remote intermediate distribution frame (IDF), which is connected to the main distribution frame with fibre optic cables. The unrestricted architecture is designed to scale and accommodate future growth. Network security, switching, and routing complies with industry and cybersecurity protocols. The design, system architecture, and project delivery is an unprecedented success both for the aviation industry and the system user,” says Adeniyi Lawal, BOW IT Support Manager. “Our new Pelco system is smart, easy to use, and flexible – and exactly what we needed to maintain the safety and security of the airport,” adds Captain Williams, MD, Bi-Courtney Aviation. “It’s a game changer, giving us confidence and more complete control and providing a higher level of security for airport passengers, workers, and operators.”
The holiday season is marked by festive spirit and family celebrations, but it is also the busiest time of year for retailers. Busy shoppers willing to spend money are an upside to the holiday shopping season, and many businesses depend on the holiday rush as a critical element to having a successful year. A downside of a busy holiday season is an increase in retail security threats including shoplifting. We asked this week’s Expert Panel Roundtable: How can technology address loss prevention challenges during the holiday shopping season?
Enveil, the pioneering Privacy Enhancing Technology Company protecting Data in Use, announces the wide release of the enhanced version of its flagship solution, ZeroReveal® Search. With the capabilities delivered in version 4.0, Enveil enables secure and efficient data usage, analysis, sharing, alerting, and collaboration across data silos in ways that were not previously possible, significantly reducing operational risk and accelerating the timeline for turning raw data into actionable insights. This expanded release comes six months after the product’s initial deployment within Enveil’s existing customer base, which includes organisations such as the Defense Innovation Unit (DIU) and the U.S. Air Force. Privately leverage data Defining the transformative category of Privacy Enhancing Technologies (PETs), Enveil’s award-winning ZeroReveal® solutions change the paradigm of how and where organisations can securely and privately leverage data to unlock value. Analysts and operators can extract insights, cross-match, search, and analyse data assets By ensuring nothing is revealed during the entire processing lifecycle, Enveil allows customers to share and collaborate across jurisdictional, organisational, and security boundaries without the need to move or pool sensitive assets. Analysts and operators can extract insights, cross-match, search, and analyse data assets at scale without ever revealing the content of the search itself, compromising the security or ownership of the underlying data, or exposing their interests and intent. Secure multiparty computation “We are incredibly proud to celebrate this release as it represents the continued advancement of our ZeroReveal capabilities, and further solidifies our position as the most mature encrypted search and watchlisting provider on the market,” said Dr. Ellison Anne Williams, Founder and CEO of Enveil, adding “By delivering capabilities that can securely and privately span global data silos, we engineer trust to empower organisations to successfully navigate the rise of the digital economy.”   Leveraging breakthroughs in homomorphic encryption (HE) and secure multiparty computation (SMPC), both pillars of the PETs category, the enhancements delivered in the 4.0 release strengthen integration, performance, and user experience. Substantial processing gains Notable features include: Performance enhancements that deliver substantial processing gains in high-volume use cases; ZeroReveal® can now process hundreds of encrypted search terms per second; A new User Interface, ZeroReveal® Slate, which makes it simple to create new workflows leveraging ZeroReveal’s encrypted search capabilities to extract immediate business value; Optimisations designed to support customer-driven requirements for performing encrypted queries in low-bandwidth environments; and Native support for encrypted queries with data partners including Sayari, DeliverFund, and Terradepth. Machine learning solution suite Enveil is deployed and operational at scale today for cross-boundary use cases Enveil is deployed and operational at scale today for cross-boundary use cases, proving that PETs are ready now to make a substantial market impact for business and mission users. The company’s business- and mission-enabling capabilities have been honored with a string of 2022 industry awards including Most Innovative PETs Provider (Pan Finance), Baby Black Unicorn (Cyber Defense Magazine), Best Data Privacy Solution (RegTech Insight USA), and CyberTech100 (FinTech Global). Data in Use solution provider Furthermore, Enveil is the only Data in Use solution provider with products certified under the rigorous NIAP Common Criteria standards. At its core, Enveil ZeroReveal® is a two-party software system protecting Data in Use by ensuring the content of the search, analytic, or machine learning model — and its corresponding results — are never exposed. The ZeroReveal® Search 4.0 release builds on the momentum generated by Enveil’s $25 million Series B funding and the release of its encrypted training solution, ZeroReveal® ML Encrypted Training (ZMET), in June, an expansion of Enveil’s machine learning solution suite.
PSA, the world’s largest consortium of professional systems integrators, announces the addition of LandSkyAI, LLC to its lineup of technology partners. LandSkyAI provides innovative and reimagined solutions with autonomous robotics to optimise safety, security, and inspection processes. “LandSkyAI brings a new, cutting-edge offering to the PSA portfolio,” said Matt Barnette, CEO of PSA, adding “Solutions designed to leverage technology with minimal human intervention are critical to the future of the expanding security industry.” Minimal human intervention LandSkyAI’s solutions add another layer of security and surveillance for businesses while acting as a force multiplier for their operations. It will expand the capabilities of standard video systems by providing a new stream of data that can be fully integrated into their video platforms. LandSkyAI can integrate with existing security sensors to create a truly automated security package. “The strong relationships PSA has with their innovative integrator base will allow LandSkyAI to work with some of the best in the industry. We are excited to help the integration community continue to evolve and grow by utilising autonomous drone and robotic solutions,” shared Jake Shild, CEO of LandSkyAI, adding “We are proud to be partnering with PSA, an industry leader, to broaden and diversify their solutions offered.”
Matrix is all geared up to participate in South Asia’s Largest Security Expo and Conference – IFSEC India 2022. At the Delhi event, Matrix will be presenting its comprehensive range of security products and solutions in the domains of IP Video Surveillance, Access Control and Time-Attendance.   In the line of business communication, Matrix will be exhibiting its wide portfolio of telecom products and solutions. With technology and customer concerns at the forefront, Matrix heavily invests in researching, designing and producing world-class enterprise solutions. Being in the industry for 30 years now, Matrix has successfully launched 60+ products and has served 1 million+ customers across the globe. High-resolution cameras Proactive Video Surveillance has become the need of the hour for any organisation’s safety and security. Ranging from 2MP to 8MP, Matrix will be showing its Bullet, Dome, Turret and PTZ Cameras that boast a high picture quality even in low light conditions. Their strong conviction for the cameras comes from UL certification, the global standard for safety and NEMA certification – the standard for protection against environmental hazards. High-resolution cameras require powerful video recording solutions with ample storage capacity and redundancy to ensure that corporations receive 24x7x365 surveillance. With 128 Channel Support and a storage capacity of up to 144 TB, Matrix’s Server-Based Network Video Recorders (NVRs), significantly address these issues, while even offering various redundancies like hot-swappable hard disks – HDD/SSD to ensure minimal downtime. With Pre-Installed Video Management Software (VMS), Matrix NVRs offer a cost-effective solution to any client’s security needs. Access Control and Time-Attendance Matrix is the only OEM that builds all the architecture elements in-house In the arena of Access Control and Time-Attendance, Matrix is the only OEM that builds all the architecture elements in-house ranging from panels, door controllers and readers, to software. At the event, Matrix will be presenting its best-in-class facial recognition-based door controller – COSEC ARGO FACE. With capabilities such as high accuracy, a high identification speed of less than 0.5 sec and a high user capacity of 50,000, this device can be connected by multiple means like PoE, Wi-fi and Ethernet. Matrix will also exhibit COSEC PANEL200P – Site Controller that oversees the access operations of the entire building. COSEC PANEL200P serves as a bridge between multiple controllers and servers in network architecture. It functions autonomously without the need for a server in Standalone Architecture. Its UI can manage 255 COSEC door controllers and 25,000 users. Cafeteria management solution Visitors will also get a chance to witness Matrix’s Cafeteria management solution that tackles issues like Food Wastage and accurate pre and post-paid bill transactions for a seamless employee experience. Matrix will also be demonstrating its Visitor Management Solution which tracks visitors in real time to keep a guard on the premises, while also providing informative reports. Telecom domain Matrix is a company that provides all business communication products In the Telecom domain, Matrix is a company that provides all business communication products and solutions under one roof. With a USP of 50 IP users, LDAP client support and Multi-level IVR amongst others, MATRIX ETERNITY NENX – a unified communication platform will be beneficial to small and medium organisations aiming to migrate towards IP Telephony. Alongside this, at the display is SPARSH VP210. SPARSH VP210, a sturdy desk phone is compatible with any third-party IP system. This helps in reducing an organisation’s existing investments in communication needs considerably. Other than this, Matrix will portray a plethora of Telecom Solutions consisting of PBXs, IP-PBXs, Server-based PBXs, Media Gateways and Communication endpoints at the event. Present market needs “At IFSEC India 2022, we look forward to meeting system integrators and leading business associates who can help us in expanding our business footprints. This event will give us an opportunity to get a clear understanding of the present market needs, which shall further help us in devising new creative security and telecom solutions,” commented Anil Mehra, Senior Vice President – Sales and Marketing. Matrix eagerly awaits everyone’s presence at IFSEC India 2022, Pragati Maidan, New Delhi, in Hall 5GF, Booth K10 from 1st to 3rd December 2022 to get a hands-on experience with its latest solutions.
DigiCert, Inc., a provider of digital trust, releases its 2022 State of Digital Trust Survey that finds that almost half of consumers (47%) have stopped doing business with a company after losing trust in that company’s digital security. If companies do not manage digital trust, 84% of their customers would consider switching, with 57% saying switching would be likely. Digital trust enables organisations and individuals to participate in the connected world with the confidence that their digital footprint is secure. Expanding attack surface Amid the backdrop of an expanding attack surface, organisations require digital trust for a variety of use cases, including connected device and user identity and access, data integrity, software security, email protection, and web and digital content integrity. Companies that are strategically investing in the digital trust are positioning themselves now as stewards of a secure, connected world. Digital trust isn’t just a buzzword. It provides the freedom to fully participate in the digital world” “Digital trust isn’t just a buzzword. It provides the freedom to fully participate in the digital world,” said Jason Sabin, CTO at DigiCert. “It has become crucial to maintaining customer loyalty and the loss of it has a direct impact to the brand. If customers lose confidence in the digital trust competency of a vendor, they’ll eventually leave.” Meeting regulatory requirements One hundred percent of enterprises surveyed said digital trust is important. Top reasons include the growing importance of data, an expanding threat surface, an increase in bad actors and pressure from customers. Nearly all (99%) enterprises believe it is possible that their customers would switch to a competitor if they lost trust in the enterprise’s digital security. It’s also essential to take stock of how customers perceive the digital trust of an organisation. Ninety-nine percent of enterprises said their customers have more confidence in the enterprise’s digital trust today than in the past. Nearly three quarters (73%) said it is significantly more. Organisations recognise the importance of digital trust to their success, and top digital trust initiatives include increasing customer loyalty, reducing the number of security incidents and meeting regulatory requirements. But it isn’t easy. The top three challenges IT cited include managing digital certificates, meeting regulatory compliance and handling the massive scope of digital assets to protect. Stringent privacy laws More than half (57%) of consumers surveyed have experienced cybersecurity attacks Consumers don’t have the same perceptions as organisations. More than half (57%) of consumers surveyed have experienced cybersecurity attacks. Top attacks include account hacks, password exposure, and bank or credit account theft. Less than half of the consumer respondents said their digital trust in the organisations they deal with is more than in the past, and 54% say there is room for improvement. North America leads the world in rating digital trust as extremely important, followed by Asia-Pacific (APAC). Ninety-one percent of APAC consumers are concerned about cyber threats, more than anywhere else in the world. For a region with stringent privacy laws, EMEA consumers are surprisingly relaxed about digital trust and have the lowest level of concern for cyber threats. However, EMEA shows strong interest at the enterprise level. Latin America-based enterprises lag behind the other regions in viewing digital trust as extremely important. Digital trust metrics The survey included a series of questions to determine how well (or poorly) each respondent was doing across a wide range of digital trust metrics. After the scores were totaled, the respondents were split into three groups: leaders, laggards and those in the middle. The leaders and laggards were then compared to examine the differences and explore what the leaders were doing better. The leaders range from 10% better to 300% better in every metric The leaders report doing three times as well as laggards with eCommerce website performance and availability, and 2.9 times as many say they’re doing well at preventing phishing or other email-based attacks. The leaders range from 10% better to 300% better in every metric. Overall, the leaders’ approach to digital trust is more strategic. Switching business partners For example: The top tier is 4.5 times as likely to believe a loss of customer trust will lead to a loss of that customer. They are also more likely to believe that digital trust affects their brand, sales and margin. In addition, they are 5.6 times as likely to say they would switch business partners if they lost trust. The top tier is further along in their digital trust journey and will complete that journey much earlier than the bottom tier. The top tier takes cyber threats much more seriously. They are 1.5 to 2.3 times as likely to be concerned about cyber threats. The top tier is up to three times as likely to be engaged with important cybersecurity safeguards. Improving digital trust DigiCert recommends the following steps to improve digital trust: Make digital trust a strategic imperative. This was one of the clear differentiators for the top-tier enterprises, which recognised that digital trust impacts important business outcomes such as brand, customer loyalty, revenue and margins. Establish a Digital Trust Office within their organisation’s technology function, with a clear leader empowered with decision-making power. Recognise that digital trust awareness is rising among the users, including consumers, and that the business success and reputation are tied directly to their ability to ensure digital trust at a high level. Enlist expert help in their quest for digital trust. One of the digital trust challenges cited by enterprises was a lack of staff expertise. Make sure the partners they bring on have a comprehensive portfolio spanning the building blocks of digital trust and can provide solutions for unified trust management for their entire organisation. Remember — the customers care about digital trust and protecting servers, users, devices, documents and DevOps processes. Establish clear lines of digital trust communication with them, explaining not only the commitment to digital trust but also the progress. Dallas-based Eleven Research administered the survey to 400 IT, Information Security and DevOps senior and C-level managers from enterprises with 1,000 or more employees. Four hundred consumers were also surveyed.
ADT Commercial, a premier provider of commercial security, fire, life safety and risk consulting services in the U.S., announced recently that Philippe Sawaya has been selected as its first-ever Director of Artificial Intelligence (AI). In his new role, Sawaya is leading company efforts in the development and deployment of AI with exceptional analytical capabilities to support the specialised needs of commercial customers across industries. Sawaya leads newly formed Artificial Intelligence team to help mobilise ADT Commercial’s purposeful innovation efforts by building the tools necessary to automate and streamline commercial customers’ security programmes to encourage adoption of future technologies. Extensive industry experience He first joined the organisation when ADT Commercial acquired Percepta, a technology company that he co-founded with the mission to develop ethical computer vision-based analytics by utilising anonymised data—addressing the issue of inherent biases prevalent in many of today’s analytics. “It is precisely this kind of ingenuity and forward-thinking that we know will be key to our success as innovators in the commercial security space and we’re thrilled to have him as a leader as we look to disrupt and revolutionise the industry,” said Ed Bacco, Vice President, Emerging Technologies for ADT Commercial. Prior to founding Percepta, Philippe studied Robotics and Computer Vision at the University of Pennsylvania’s School of Engineering and Applied Science, where he was selected to join the General Robotics, Automation, Sensing and Perception (GRASP) laboratory. His work at GRASP focused on implementing video pose estimation models and training convolutional neural networks.
Sabre Corporation, a software and technology provider powering the global travel industry, announced a partnership with Girls Who Code (GWC), an international non-profit organisation dedicated to closing the gender gap in technology and changing the image of what a programmer looks like and does. Sabre’s sponsorship will help empower a generation of change-makers by supporting Girls Who Code after-school clubs for 3rd to 12th graders, which seek to educate, engage and connect girls with technology in their communities. At the collegiate level, the GWC alumni programme helps women develop skills, build confidence and connect with women in technology.   Technology provider “As a leading technology provider for the travel industry, Sabre has a vested interest in making sure tomorrow’s brightest technologists embody the rich diversity that we need in our company,” said Shawn Williams, Chief People Officer for Sabre. He adds, “Girls Who Code and its focus on gender equity in engineering and other technology fields aligns with our commitment to embrace a culture where every team member has an opportunity to be successful as we work together to develop the solutions that will power the future of travel.” Opportunity actively engage Sabre is committed to creating a culture of inclusion and belonging Through Sabre’s Women in Tech resource group, Sabre team members will have the opportunity to actively engage in Girls Who Code events, community-building activities and recruitment opportunities for Sabre internships and careers.   “At Girls Who Code, we understand that it’s not enough to foster a passion for computer science among girls and young women. We also need to build pathways to ensure that they are given equal access to opportunities that turn their interest into lucrative and exciting careers,” said Tarika Barrett, CEO of Girls Who Code. Tarika Barrett adds, “Our partnership with Sabre is an important step in our work to close the gender gap in tech and level the playing field for our most marginalised students.”  Culture of inclusion Sabre is committed to creating a culture of inclusion and belonging and values the diversity of our employees all around the world. Sabre’s inclusion groups, including Women In Technology and Women’s Career Network, foster an environment where employees can bring their full selves to work and belong. In addition, Sabre’s corporate social responsibility (CSR) programme has a rich history of giving back to our communities all over the world, including the support of organisations who educate and empower underrepresented and underserved groups. Full-time team members are also given one paid day, every quarter, to give time to causes and organisations they choose.
IDEMIA, the pioneer in Identity Technologies, announced that it has supported SK Telecom, Korea’s telecommunications operator, in successfully migrating its consumer eSIM management platform to the Microsoft Azure public cloud. Completed at the end of June 2022, the migration is in line with the Korean government’s announcement that eSIM services for smartphones will be offered in the country beginning on September 1, 2022, onwards. Smart Connect Consumer Since 2018, IDEMIA has provided Smart Connect Consumer, its eSIM management platform for consumer devices to SK Telecom to cater to their eSIM-equipped smartwatch end-users. With eSIM services expanded to smartphones, IDEMIA worked closely with SK Telecom for the migration of their eSIM management platform to the public cloud, enabling SK Telecom to leverage carrier-grade solutions to achieve scalability, availability, capacity, and security for their eSIM connectivity activities. Consistent user experience With the public cloud migration, IDEMIA’s carrier-grade eSIM manager can handle large volumes of eSIM transactions “With the exponential growth of eSIM services and capabilities, immense computing power is required to deliver seamless connectivity, robust services, and a consistent user experience,” said Fabien Jautard, Group Executive Vice President, Connectivity Services at IDEMIA. “We have been a trusted partner in SK Telecom’s eSIM journey since the beginning and are proud to continue supporting them in delivering the best possible eSIM experience to their smartphone users, even during peak activity periods.” With the public cloud migration, IDEMIA’s carrier-grade eSIM manager has a geo-redundant architecture for traffic load balancing, dynamically adapts to traffic peaks, can handle large volumes of eSIM transactions, and has the most advanced security certifications and protection systems. eSIM services for smartphone “The advent of eSIM services for smartphones in Korea is a very exciting smartphone milestone, and we have been working very closely with IDEMIA over the past year to ensure we were fully migrated and well-prepared to serve our subscribers upon launch,” said Moon Kab-In, Vice President and Head of Smart Device Office at SKT. “We have been very pleased with their stable eSIM platform and proactive support, and look forward to continuing this fruitful partnership as the eSIM connectivity market continues to grow in Korea and beyond.”
Barclays Bank has revealed that purchase scams rose by 34% following Black Friday weekend in 2021, putting Christmas shoppers at huge risk. John Davis, Director, UK & Ireland, SANS Institute, EMEA says, “Hackers are known to turn up the heat with high attack volumes and high-pressure tactics at the most challenging of times. With cash-conscious consumers’ attention firmly fixed on locking in festive bargains, cybercriminals will hope we’ve dropped our guard, giving them a prime opportunity to steal our personal and financial data.” Vigilance   “It’s clear that cybercriminals are levelling up with attacks that are more prevalent, more sophisticated, and harder to detect than ever before. That’s why vigilance is our most critical first line of defence.” “Opportunistic hackers will try to create a false sense of urgency so it’s important to exercise caution by staying scam-aware, trusting gut instinct, and building security into all of our online behaviour.” Scam-aware approach “The golden rule to remember is that prevention is always better than a cure. Don’t panic and make rushed decisions out of fear of missing out on a deal. The power to stay ahead of the hackers comes from learning how to protect ourselves online.” “It’s worth taking time with purchases and remembering that if something looks too good to be true, it often is. It’s time to turn the spotlight on simple yet effective approaches like better and more robust passwords, and a questioning scam-aware approach, to ensure we can bargain hunt with full peace of mind.”  
Morse Watchmans, the pioneer in key control and asset management systems, is exhibiting a wide array of its key control and management solutions at ISC East 2022, November 16-17 at the Javits Centre in New York City. Morse Watchman’s flagship system, KeyWatcher® Touch, will be on display alongside a suite of additional products at booth #324. “We once again look forward to showcasing our wide range of products at the Northeast’s preeminent security & public safety event, ISC East,” said Tim Purpura, VP of Global Sales and Marketing, Morse Watchmans. Scalable key control solution “This is a special opportunity for us to connect with our customers and partners in our own backyard, as well as introduce new security professionals to the exciting capabilities offered by Morse Watchmans’ solutions.”  KeyWatcher® Touch also integrates with many brands of access control systems Featured solutions on display and available for demonstration by Morse Watchmans include: The KeyWatcher® Touch electronic key cabinet is a scalable key control solution for organisations looking to secure, manage and track keys and other assets. With a 7” touchscreen and patented SmartKey system with KeyAnywhere technology, it is easy to withdraw and return a key securely to any key cabinet located within an enterprise. KeyWatcher® Touch also integrates with many brands of access control systems for a layered security approach. Electronic locker systems SmartKey® electronic locker systems are the ideal solution for securing, tracking, and controlling access to larger objects. Set up SmartKey Locker systems as a personal metal locker storage space for one or multiple users. SmartKey metal locker cabinets are engineered for complete interactivity with other business systems such as access control.  Now get touchscreen convenience with the KeyBank® Touch key access control system – the safer, more secure way to manage large quantities of keys. The bright 7″ touchscreen key organiser system gives users an easier-to-use interface for the management and control of up to 18,000 keys and 10,000 users per site. These solutions, coupled with Morse Watchmans’ industry-leading software, service and support, ensure the safety and security of a variety of physical assets. Inventory management platform Morse Watchmans, a security solutions provider since 1882, was acquired in December 2021 by TouchPoint, Inc., a privately held diversified global growth company. In its portfolio, TouchPoint provides access hardware, medical technology, and intelligent inventory management solutions. Morse Watchmans joins TouchPoint’s intelligent inventory management platform, positioning themselves for exponential market growth to provide global key control and asset management solutions.
ASSA ABLOY, the pioneer in access solutions, has received validation by the Science Based Targets initiative (SBTi) for the company’s emission reduction targets. In 2020, ASSA ABLOY launched ambitious sustainability goals to substantially reduce its greenhouse gas emissions across the entire value chain, including halving absolute emissions by 2030 and reaching net-zero no later than 2050. The SBTi has ratified that ASSA ABLOY’s emission reduction targets are in line with the requirements to limit global warming to 1.5°C, which is consistent with the latest climate science and the Paris Climate Agreement. Reach net-zero Sustainability will be vital to economic and industrial development in the coming decades” “Sustainability will be vital to economic and industrial development in the coming decades. ASSA ABLOY is committed to halving CO2 emissions from our own operations (Scope 1 and 2) by 2030. In addition, we will reduce the footprint of our wider value chain, including raw materials, logistics and products by 28% by 2030, thereby addressing our Scope 3 footprint. We will reach net-zero no later than 2050,” says Nico Delvaux, President and CEO of ASSA ABLOY, adding ”The ratification of our goals by SBTi demonstrates our ambition to lead our industry towards a more sustainable future.” Robust plans Charles Robinson, Director and Head of Sustainability, ASSA ABLOY, said “We have robust plans in place to reduce our energy consumption by applying our manufacturing footprint programme and energy efficiency measures at our most energy intensive sites.” He adds, “This, combined with increased use of renewable energy, will help us achieve our 50% reduction target compared to the baseline year of 2019. However, more than 98% of our total CO2 emissions in the wider value chain are in our Scope 3 footprint.” Charles Robinson continues, “ASSA ABLOY has committed to reducing its Scope 3 emissions by 28% by 2030. This will be achieved through concrete initiatives to use raw materials more efficiently, utilise low-carbon materials and develop more sustainable solutions.”
With the ever-increasing rise in cybercrime, Genetec Inc. (“Genetec”), a technology provider of unified security, public safety, operations and business intelligence solutions, is cautioning organisations of all sizes to be vigilant about the cybersecurity risk posed by legacy access control systems.   “Many organisations are operating with access control systems that date back 10 years or more. While these older systems still allow employees to badge in and out, there’s a very high likelihood that these systems employ technologies that are extremely vulnerable to modern cyber threats,” says Christian Morin, Vice President of Product Engineering and Chief Security Officer at Genetec Inc. Vulnerabilities in legacy access control systems can introduce cybersecurity weaknesses that may put an entire organisation at risk. Cybercriminals can exploit weaknesses in access control system credentials, controllers, servers, readers or workstations connected to the network. Cybersecure access solutions Once a cybercriminal has breached access control system credentials, they can then move on to an organisation’s network Once a cybercriminal has breached access control system credentials, they can then move on to an organisation’s network and can gain control of other building systems, view or steal confidential information from internal records or launch attacks designed to take key systems offline. Companies that are affected pay a heavy price; the average cost of a data breach rose from USD 4.24 million in 2021 to USD 4.35 million in 2022. Hence, it’s never been more important for organisations to be educated on the risks associated with legacy systems and the advantages that new cybersecure access solutions can offer. Cybersecurity best practices Cybersecurity best practices for access control systems To improve the cybersecurity of access control systems, Genetec recommends the following steps: Upgrade the system. Older systems were not built to address today’s threats. When evaluating a new access control system or upgrading an existing system, make sure that cybersecurity is a key component of the vendor selection criteria Use advanced secure credentials and the latest communications protocols to secure data transmission since older credentials are easy to clone using readily available tools Educate employees and partners about cybersecurity best practices and ensure they are prompted to change passwords often Regularly check for firmware and software updates and install once available Use a centralised identity access management system to ensure virtual and physical authentication and authorisation of employees for better control and more effective maintenance of your systems Create a dedicated network for access control systems so that there is clear segregation of networks based on their purpose Choose a security provider who can demonstrate compliance with established security certifications Ensure that the access control system uses proven data encryption standards as well as multi-factor authentication Work with a partner that has strong supply chain risk management, a dedicated team to monitor cyber threats and ensures software is updated frequently and patched as needed Access control technology Access control technology has undergone a huge transformation in recent years. Customers are gradually freeing themselves from proprietary solutions and demanding more flexible, open solutions. Forward-thinking technology manufacturers have now introduced a new breed of more cybersecure solutions that offer benefits beyond locking and unlocking doors. A unified access control system that uses the latest cybersecurity standards to secure communication, servers and data such as Genetec Security Center Synergis™ can not only protect an organisation’s assets and people but help them improve their business operations and decision-making. By choosing an open architecture IP-based access control system, organisations have the flexibility to upgrade to the latest supported technology at any time, move at their own pace and work within their available budget.
Sielox, an established industry pioneer in layered access control solutions, is featuring its latest security solutions at ISC East 2022, November 16-17 in New York City. Sielox’s flagship solution, the Pinnacle™ 11.0 Access Control Platform, will be available for demonstration at booth #841 alongside additional products including the AnyWare™ Browser-Based Mobile Access Control Solution, CLASS™ Emergency Notification and Response Solution and the all-new 2700 Intelligent Access Controller. “We are thrilled to be back at ISC East demoing the latest iterations of our well-known products, many of which have been recently upgraded to better meet the evolving needs of security professionals,” said Karen Evans, President, Sielox. “Attendees will get to see these new features in action, witnessing the recent updates that provide real intelligence to better protect people, property and assets.” Sielox solutions The latest Sielox solutions on display and available for demonstration at ISC East 2022 include: The newly released Pinnacle™ 11.0 Access Control Platform with pre-emptive intelligence now offers hundreds of user-selectable filters, provide Pinnacle users with real-time data on virtually every aspect of access activity and system status, effectively transforming traditional proactive access control deployments into pre-emptive solutions for myriad physical security and business intelligence applications. These enhanced capabilities allow users to leverage pre-emptive data and advanced notifications for a comprehensive range of applications across the enterprise. Additional new features AnyWare 2.0 Browser-Based Access Control Solution provides expanded functionality Additional new features of Pinnacle 11 include: support of Windows 11; enhanced Time Zones (Schedules) and Holidays with expanded configuration (e.g., scheduled and repeatable intervals daily, weekly, monthly, yearly; different Holidays by controller; creates exceptions with auto-restore); virtual environment support; flexible event filtering and assignment; wireless lock support with no licensing fees; the ability to execute local, regional or global lockdowns; a web client from any desktop PC or smart mobile device; and more. AnyWare 2.0 The new release of AnyWare 2.0 Browser Based Access Control Solution provides expanded functionality and more powerful processing, making it faster and easier to take access management mobile. A simple and scalable browser-based access control monitoring and event management solution, AnyWare 2.0 is highly cost-effective, ideal for SMB applications up to 40 doors and up to 25,000 cardholders. Configurable in minutes, the plug-and-play solution allows authorised individuals to manage doors and alarm points from anywhere, at any time, via LAN, WAN, Wi-Fi and cellular service. AnyWare operates on any smartphone, tablet and laptop – providing a cost-effective, easy-to-use security foundation. AnyWare 2.0 is currently available for upgrades and new installations. Further improvements Responders can also chat to specific condition colour status locations to exchange detailed information Further improvements to the Sielox field-proven CLASS 2.0 Emergency Notification and Response Solution include new interactive floor plans and a new Responder dashboard with an enhanced chat feature enabling two-way communications between individuals or groups, buildings or floors. Responders can also chat to specific condition colour status locations to exchange detailed information or instructions. Class 2.0 can also automatically send notifications via email or text alerts, pop-up instructions or detailed evacuation plans specific to condition or alert level changes. The newly enhanced Class 2.0 is currently available for upgrades and new installations and features a new Sielox Mobile app. 2700 Intelligent Access Controller The all-new 2700 Intelligent Access Controller is a replacement for the Sielox legacy 1700 controller that delivers new benchmarks in speed, performance and reliability. The new 2700 is a single-controller solution for use with any combination of Sielox’s layered access control and emergency notification and response solutions. Embedded with a Linux OS platform, the 2700 accommodates up to 34 doors (2 hardwired and 32 wireless) and can be expanded to include 60 Inputs/outputs. It also features a web interface for remote diagnostics and troubleshooting. Designed for easy installation and integration, the 2700 features variable auto-sensing input power ranging from 9 to 28VDC and auxiliary (1A max) 12VDC power output, is OSDP compatible and comes available in a PoE version for fast and easy deployment.
Founded by a trio of highly experienced and well-known professionals with well over 100 years of combined experience in the physical security market, Active Intelligence is making its public debut at ISC East 2022 in booth 707. The company was founded in 2019 with a very ambitious goal of transforming video surveillance systems from reactive tools to preventive, proactive solutions. With the launch of ASTRA, AI-driven video solutions can now be applied to mainstream video security applications. Video security applications Active Intelligence’s founders include industry veteran Ken LaMarca, CEO at Active Intelligence and 33-year sales and marketing veteran in the physical security industry. Jordan Heilweil, Chief Revenue Officer at Active Intelligence, bringing 37 years of experience in advanced video surveillance solutions to the organisation. And Charles ‘Chuck’ Andrews, Chief Strategy Officer at Active Intelligence, renowned industry influencer, and founder of ‘Friends of Chuck’ – a digital community of security professionals with over 100,000 members. ASTRA is designed to help security professionals detect both known and unknown threat” “Active Intelligence is taking a modern approach to video security with the development of a new software powered by AI and proprietary algorithms that detects and alerts on all anomalous events, without the restrictions of conventional rules-based systems,” said LaMarca. “ASTRA is designed to help security professionals detect both known and unknown threats by identifying statistical anomalies in video feeds.” Detecting anomalous events Active Intelligence’s flagship product, ASTRA detects anomalous events by first learning what is normal in a specific camera’s field of view, and then detects abnormalities to alert security operators that an anomaly has occurred. This covers a nearly infinite range of events like a person lying on the ground, physical violence, fire and smoke, pedestrians walking in front of moving vehicles, thefts, vandalism, traffic jams, wrong way driving, and much more – all without the need for rule configuration. In addition to physical security, ASTRA’s extreme versatility is ideally suited for a wide range of commercial and industrial business intelligence applications. Headquartered in Port Charlotte, Florida, Active Intelligence is rapidly expanding its core team of software engineers, sales representatives, and marketing professionals. With several highly successful beta site deployments to date, Active Intelligence is poised for tremendous growth and expansion in 2023.
For online retailers operating within the UK and Ireland, this year’s Black Friday and holiday shopping period are expected to be greatly affected by the ongoing cost-of-living crisis. This puts significant pressure on businesses who rely on this time of year to generate or boost their annual profits. Cybercriminals are adding further pressure to e-retailers by continuing to take advantage of the growth in online shopping and digital transactions. Amongst the types of attacks being launched by threat actors are distributed-denial-of-service (DDoS) attacks, which are intended to overwhelm a target’s online services. Most targeted countries Indeed, according to NETSCOUT’s 1H 2022 DDoS Threat Intelligence Report, attackers are further emboldened in their cybercriminal efforts by newly established motivations, vectors, and attack methods. Compared to other European countries observed, the UK and Ireland were both among the most targeted countries by DDoS attacks within the first half of 2022. The UK experienced an average of 743 attacks per day between January and June 2022 The UK experienced an average of 743 attacks per day between January and June 2022. In the same period of time, Ireland faced an average of 284 attacks daily – a 118 per cent increase from the last six months of 2021. Findings also indicate that e-commerce was the third most targeted sector by DDoS attacks within Ireland. On a global scale, e-commerce remains within the top 10 most targeted sectors. Circumventing online defences Fortunately, the e-commerce sector was targeted less at the tail end of the pandemic, compared to 2H 2021. However, DDoS activity still poses significant risks to businesses as cybercriminals have become more sophisticated at circumventing online defences. Richard Hummel, threat intelligence lead for NETSCOUT, comments on how digital retailers throughout the UK and Ireland can defend themselves from DDoS attacks ahead of this Black Friday and Cyber Monday and the rest of the holiday shopping period. He said, “The global threat landscape is becoming increasingly more complex, so it is not a matter of if an attack will occur, but when. With the run-up to Christmas being the peak trading period for retailers, they are under immense pressure during this time to prevent costly downtimes, financial losses, and reputational damages.” Robust threat intelligence solutions This will allow online services to go virtually undisturbed in the event of a DDoS attack” Richard Hummel adds, “From a cybersecurity perspective, digital retail businesses have been some of the most targeted by DDoS attacks, so it is vital that they ensure their cybersecurity strategy is robust, and up to date with current threats.” He continues, “To successfully mitigate emerging risks, businesses should consider investing in modern, robust threat intelligence solutions that can help mitigate a variety of cyberthreats, including DDoS attacks. Additionally, businesses should test their online infrastructure regularly to ensure that any changes to critical digital components are incorporated into an established DDoS defence plan. This will allow online services to go virtually undisturbed in the event of a DDoS attack.” Unfamiliar cyberthreat landscape Richard Hummel said, “Lastly, organisations should also consider utilising the expertise of an on-demand DDoS attack specialist before attempting to navigate the unfamiliar cyberthreat landscape.” He adds, “Departments, businesses, and key stakeholders can greatly benefit from an expert, especially during a DDoS attack. Only by properly implementing these strategies can online retailers within the UK and Ireland significantly decrease the impact of DDoS attacks on their digital operations ahead of the holiday season.”
Vintra, Inc., a provider of AI-powered video analytics solutions, announced a new module for its Vintra Fortify platform designed to automate and simplify the management of existing manual security processes at mission-critical locations. Vintra Guard, available as an additional module for Vintra Prevent, enhances real-time monitoring and enterprise alerting by incorporating video-based identity verification for access control management. Integrated with C•CURE Initially integrated with the C•CURE 9000 Security + Event Management System (other access control integrations will be introduced in 2023), Vintra Guard will automate two-factor identity verification for C•CURE users, incorporating class-leading video analytics into a powerful access control system in order to automatically detect unauthorised access across a campus facility, remove the manual review of access control events and better protect people, places and things. “We are constantly seeking to improve the level of insights that organisations can derive from video analytics and the high-fidelity data they provide,” said Brent Boekestein, CEO and Co-Founder of Vintra. He adds, “Vintra Guard builds on our premise and promise that the future of security is multi-modal and this C•CURE integration is a perfect example of how our award-winning AI-powered video analytics can provide the easiest way to add a layer of intelligence on top of traditional access control to create a more-aware, more-automated and more-secure environment.” Reviewing access events Vintra Guard will automatically review all access events at a given point of entry Vintra Guard will automatically review all access events at a given point of entry, using facial recognition to verify the identity of the person that used each credential in order to find any unauthorised credential usage. If a badge is used by an individual that is not the actual credential holder, an alert will be generated, available within the Vintra Fortify platform or sent to leading VMS platforms such as Genetec or Milestone. Potential breach Given a potential breach, Vintra Guard users can quickly perform either a Live Re-ID or post-event Re-ID, Vintra’s unique search feature that can then quickly locate any potential offender in seconds across any of their connected cameras. Vintra’s Re-ID feature provides valuable, timely situational awareness, illustrating an individual’s journey throughout the facility, their current location and information needed to quickly mitigate the situation. Simple yet comprehensive approach Vintra’s Re-ID technology is effective using either facial recognition or via a body appearance search, providing a simple yet comprehensive approach to protecting both privacy and security. As a result, Vintra Guard frees up key personnel dedicated to manual identity verification efforts, adding an AI-powered second layer of security that ensures all access events are properly verified and enabling security teams to better fortify an entire facility.
Cybersecurity in the physical security world
RFID for GMP/GLP environments
Smart surveillance in the workplace
Anatomy of a False Alarm
Gunshot detection
North West security firm fly in to top three percent of UK security companies
viisights collaborates with Guardsman Group for Caribbean expansion
NETSCOUT’s report explains how e-retailers can mitigate increasing cyber risks ahead of Black Friday and festive shopping season
Doorking ProxPlus™ Secure Card Readers
Vanderbilt Feenics Cloud-Based Enterprise Access Control Platform
Dahua DH-IPC-PFW5849-A180-E2-ASTE 2×4MP Full-Color Dual-Lens Splicing WizMind Network Camera
Follow us
DMA
SourceSecurity.com – Making the world a safer place
Copyright © Notting Hill Media Limited 2000 – 2022, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com | MaritimeInformed.com
Your guide to defending against today's cyber threats

source

Leave a Reply

Your email address will not be published. Required fields are marked *