4 January 2021

Exploitable Attack Surface

The 6 technology trends affecting the security sector in 2021

It’s useful when looking forward to first look backward: hindsight has a wonderful way of providing context for future-gazing activity. And when looking back over the past year, one insight could understandably be that attempting to predict the future is a futile activity! Few would have predicted the enormous impact the COVID-19 pandemic would have across the world throughout 2020. Within a short space of time, our way of life, working practices and business operations were upended. In dealing with the impact on our own business and workforce – with employee health and safety at the forefront – we also saw new use cases emerge for our technology and solutions, in addition to new ways of working, that will continue into 2021 and beyond. Technological advancement continues, however, and as we have seen in recent years, rather than heralding the emergence of completely new technologies, the trends we see for 2021 are shaped by how and why technologies are used, and the associated implications. Trust remains at the top of the agenda We’ve mentioned trust in previous trend posts, and it’s become even more critical. There are many factors which contribute to maintaining trust, and the technology sector is under more scrutiny now than ever before. Customers and end users are demanding transparency around how tech is used and how data is managed, especially with increased surveillance. This, together with the need to maintain privacy, will be a key challenge. Renewed discussions around trust will directly impact how organizations in all sectors actively demonstrate why they are trustworthy. Due to its nature, the security sector will be under even more pressure to double down on its efforts in this area. The world goes horizontal Recent years have seen applications and services largely designed for specific environments, whether server-based, in the cloud or at the edge. Driven by a desire to achieve optimal performance, scalability, and flexibility, along with the benefits of accessing and using data at any time and from anywhere, the next year will see momentum towards horizontal integration between environments. Increasingly intelligent applications and services will be deployed across all three instances – server, cloud and edge – employing the best capabilities of each, improving solution performance and efficiency. For example, edge analytics in a surveillance camera will potentially message an operator with an alert, the operator then accessing the live video feed through a cloud-based application to verify and respond. This shift to a ‘horizontal’ approach will increase the speed and accuracy of security and surveillance – moving from reactive to proactive, manual to automated – while also reducing bandwidth, energy and cost. Cybersecurity: the continual trend Such horizontal integration will only increase the focus on robust cybersecurity – a chain, after all, is only as strong as its weakest link – and the constant evolution of the threat landscape cements its relevance year after year. Due to the potential for high financial returns and disruption of critical infrastructure, new capabilities, tactics and threats will continue to emerge and require constant vigilance. AI will be employed by cybercriminals as much as in any sector, strengthening their ability to find and exploit vulnerabilities. Deep fakes will become even more sophisticated and realistic, potentially calling into doubt video surveillance evidence. As a result further developments in methods to verify content, devices and applications in order to maintain trust in their authenticity will be required. Advancements in cybercrime will also extend to tried-and-true methods such as phishing lures which will become more difficult to spot. As a result, employees will be even more susceptible to these types of attacks and constant education and reminders of best practice in cybersecurity will, as ever, be needed. Traditionally, cybersecurity has been based on a ‘perimeter’ model, where the network is protected by a single, hopefully impenetrable wall made up of firewalls, VPNs/VLANs, air-gaps, software-defined networks and other technologies. But this model is challenged, and a single breach can result in the entire network being compromised. The move to zero trust networks will therefore accelerate, where the security profile for each device and application is independently evaluated. Trust will be delivered through device-to-device and/or application-to-application communication through signed firmware, software updates, secure boot, encrypted data/video, and secure identity. It may seem like an indictment of the age we live in, but the only way to trust the security of anything is to trust nothing! The reality of AI: developing the good, addressing the bad and anticipating the ugly We’ve been talking about AI for so long that some might question its validity as a trend. But with Machine Learning (ML) and Deep Learning (DL) now broadly available in surveillance technology, the implications of its use will be a factor in 2021. We now have concrete examples of various use cases for AI in surveillance, but as we have seen in other sectors (e.g. autonomous vehicle crashes) the positive impact of AI can be outweighed by the attention given to specific failures. Narratives tend to focus on the errors of automation, and this will no doubt also be the case in the surveillance sector. However, this shouldn’t act as a deterrent and we must not lose sight on the positive potential use cases of Machine Learning and Deep Learning in surveillance. For example, using these capabilities in edge devices can assist in identifying objects and reducing false positives. As a result, security experts can move to a proactive, event-based way of working, rather than continuous manual monitoring. Low- and no-contact technologies come to the fore Regulations, rules and consumer habits established during this year will become common-place in 2021. Technology will support in how these are monitored and enforced, driven by hygiene concerns and social distancing. As a result, the implementation of low- or no-contact technologies, especially in areas such as access control, will increase. In addition, surveillance solutions with people-counting capabilities will become the norm, to ensure adherence to social distancing regulations. Sustainability reimagined One concern during the pandemic has been that the

The 6 technology trends affecting the security sector in 2021 Read More »

Cyber Security

2020 in 20 cyber security figures

The pandemic of 2020 speeded up the digital transformation of many businesses and changed the way we work. Now 43% of the workforce work remotely at least some of the time and a global market for cloud computing reached a record $266.4 billion. The departing year saw an increase in criminal activity online, however the share of IT budgets dedicated to cybersecurity grew by  up to 29%. The ongoing change in remote working and business network security is apparent in 20 of the most intriguing industry statistics of the past year. 1. Global losses from cybercrime now total to over $1 trillion. 2. Average total cost of a data breach is $3.86 million. 3. 86% of breaches were financially motivated. 4. 63% of the incidents reported were caused by negligent employees or contractors. 5. Healthcare is the most expensive industry affected by cyber threats, with damage estimated up to $7.13 million. 6. Nine out of 10 cyber-breaches reported to the UK’s Information Commissioner’s Office (ICO) were caused by the end-users. 7. The data breaches cost the most in the US, amounting to $8.64 million. 8. It takes on 280 days to identify and contain a breach. 9. 99% of the vulnerabilities exploited by the end of 2020 will be the ones known by security and IT professionals at the time of the incident. 10. Mean Time to Remediate vulnerability (MTTR) for internet-facing vulnerabilities is 84.59 days. 60% of breaches involved vulnerabilities for which a patch was available but not applied. 11. If a small or medium business discovers a breach instantly, it costs on average $28k, rising to $105k if undetected for more than a week. Even after an instant detection, as many as 417 records are compromised, reaching up to 70,000 if the breach is undetected for over a week. 12. The rate of discovered cyberthreats in Q2 2020 was 419 per minute, an increase of almost 12% in comparison to the previous quarter. 13. The average ransom payment rose up to $178,254 in Q2 2020, an increase of 60% to the previous quarter. 14. In a single “highly sophisticated” attack, hackers managed to access and steal the email addresses and personal travel plans of about 9 million EasyJet customers. 15. 44% of customers would stop buying from a company that fell victim to a cybercrime. 16. 70% of enterprises say cybersecurity is among the main spending trends of their IT budgets, preceded only by analytics (75%). 17. Businesses spend about $2,700 on average per full-time employee on cybersecurity, compared to $2,300 in 2019. 18. More than half (55%) of business and tech/security executives lack confidence that cyber spending is aligned to the most significant risks. 19. 64% of cybersecurity professionals report staff shortages at their own organizations. 20. An entry-level cybersecurity agent in the US can expect to earn $73,340 a year on average. BONUS: 3 pandemic-related cybersecurity numbers  1. Because of the pandemic, half of consumers are more willing to part with their personal data if it was used for research effort or community wellness. 2. FBI’s Internet Crime Complaint Center (IC3) said they were receiving between 3,000 and 4,000 cybersecurity complaints per day, compared to 1,000 before COVID-19 took hold. 3. Nearly half of organizations (45%) have adopted a new technology or contracted with a new vendor to enable remote work due to COVID-19. “This year has transformed how people work, rest, shop, travel and communicate. With an ever-increasing online presence and threat perimeter, cyber security will continue to be crucial in 2021 — adapting to what many have labelled as the new normal“ says Juta Gurinaviciute, the CTO at NordVPN Teams.   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

2020 in 20 cyber security figures Read More »

shutterstock 746441521

The six big risks for 2021

International risk management and assistance expert, Healix International, has identified six key areas of risk – besides the continued impact of COVID-19 – for global organisations in its 2021 Risk Oracle report. Natural Disasters – The increasing frequency of extreme weather events with natural disasters becoming more pronounced both in terms of frequency and severity. Building resilience to natural disasters is a significant exercise. Faceless Threats – In a context of increased isolationism, and more time spent online, individuals will become increasingly disconnected from normative community activity with a comparative increase in crime and incidents of violence perpetrated by ‘faceless’ lone actors. Supply Chain Disruption – The highly complex logistical webs that make up the global economy have predominantly been designed with cost and efficiency in mind. Unless resilience starts to be factored into these considerations, disruption to supply chains will remain a significant operational risk factor. Cyber Attacks – No longer just an inconvenience, they are potentially calamitous. More worrisome, attacks targeting government infrastructure are on the rise, and any cyber breaches in this space could have unprecedented implications. Decay of the ‘social contract’ – Mounting frustrations over inequality, cynicism of perceived corrupt political elites, and distrust of wider civil society including the media and big business amid the pandemic of ‘Fake News’ are likely to lead to increased public agitation and worsening levels of political cohesion. Erosion of domestic political cohesion fuelled by social media – Complex political issues find themselves being misrepresented in the form of a ‘post’, ‘share’, or ‘tweet’. This dynamic will become more prevalent in 2021 and result in even more social and political divisiveness, with rising levels of political risk in locations where the ‘culture war’ is most pronounced. As Chris Job MBE, Director, Risk Management Services, Healix International explains, it is vital for organisations with an international footprint to ensure that the myriad of risks beyond the coronavirus remain a focus. “2021 is likely to be as busy a year for challenging global events, some predictable and some unprecedented. Overlay this expectation with a new and as yet undefined normal and a global drive for economic growth, the need for robust organisational resilience plans is clear. The key now is to ensure consistent and reliable monitoring is combined with access to the most appropriate resources to ensure employee wellbeing remains the priority. “With our deep-rooted, in-house medical and security expertise underpinned by modern technology, Healix offers a single-source comprehensive, compelling and powerful risk solution for 2021 and beyond.” The 2021 Healix International Risk Oracle Report, along with a global Security Risk Map, can be downloaded from https://info.healix.com/download-risk-forecasts-2021   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitybuyer.com

The six big risks for 2021 Read More »

shutterstock 291897773

Perimeter Protection during a lockdown

With businesses closing around the world to protect citizens in a lockdown during the Coronavirus pandemic, companies must also protect their commercial buildings and sites As we enter into the latter half of 2020, the Coronavirus pandemic continues to plague the world, and further lockdown measures are sure to come into effect with infection and death rates on the rise.  Aside from the necessary contingencies that companies are having to take financially to recover from lockdown, another threat has become more prevalent. Commercial burglaries have become wrought with employees and companies transitioning to a remote working structure. Similarly, in other industries such as construction, sites have had to close down and could potentially face this again. So, how can businesses protect their sites when workforces are lessened. Perimeter protection and CCTV surveillance, have become even more popular solutions.  With only companies in industries deemed “essential” by the Government being allowed to continue as normal, other environments have had to abide by certain measures to remain open. If we enter into another lockdown, all unessentials businesses will be forced to shut again. However, for the property sector, advice has been less clear.  In the UK, while the construction industry didn’t experience an enforced shut down, owing to the essential role of many projects, housebuilders were left in a quandary where their developments were definitely non-essential, but they were still permitted to operate as usual according to Government guidance. This has resulted in some firms choosing to undertake a voluntary shut down to protect workers. Statistics have seen a rise in commercial break-ins and theft, as opportunistic thieves have taken advantage of the situation. Due to this rise in burglaries, companies of offices, construction sites, entertainment buildings, as well as other commercial industries, must re-evaluate their perimeter protection if choosing to leave buildings and sites vacant. Protecting site perimeter Shutting down your business will place more emphasis than ever before on the quality of your perimeter protection measures, and particularly the fencing, barriers and access control solutions you have installed. Not only should your boundary be tough enough to be a major obstacle to trespassers, but it also needs to be intimidating in order to act as a deterrent for any opportunistic thieves. Any fencing you have in place should be at least 2.4 metres tall to have any security value (RISC Authority), as this will ensure it provides a visual barrier as well as being imposing to climb. You can also consider adding anti-climb enhancements, such as barbed wire, to increase the height to a recommended 2.9 metres. Consider installing palisade or welded mesh fencing, both of which are more effective at keeping intruders out than basic chain-link fencing. Additional measures you can take to secure your site’s perimeter include adding barriers around high risk areas within the site, which will act as extra obstacles for trespassers, and placing kerbs and bollards at points where there might be unauthorised vehicular access.  Concrete barrier blocks are a cost-effective and robust physical barrier protecting your building, site or development plot by limiting unauthorised people or vehicle access and stopping the theft of goods and vandalism. Concrete barriers provide the best possible physical protection for vulnerable perimeters and entrances. Typically, you will encounter four different types of concrete barrier blocks which can be installed relatively quickly. These include: Temporary vertical concrete barriers which are versatile physical barriers used to secure wide entrances from unwanted entry. Precast concrete barriers — These barriers can range in size from 1.5m to 3m giving security to large vacant construction sites. Jersey barriers provide an end-to-end interlocking system of varying lengths to protect your site from high impact damage, giving your site a strong and secure perimeter. Interlocking blocks that can be stacked vertically/horizontally to create a retaining wall made up of any size. These blocks are quick and easy to install and have fire and water resilience, making it a robust barrier. Concrete barrier blocks give you peace of mind that no unauthorised person or vehicle can gain access to your vacant site helping to prevent theft or vandalism of your site, plant machinery or property. Deterrents Alongside an imposing perimeter, you should make use of deterrents to put off any opportunistic intruders. Highly visible CCTV and alarm systems are some of the most effective measures you can take. They will also aid you in any response to a break in, whether that is alerting you as soon as possible, with smart technology, or providing evidence for prosecution. You can enhance the visibility of these measures by placing warning signage around your perimeter. CCTV towers operate using independent solar panels and batteries, or a mains power supply, requiring little maintenance once installed. This means the CCTV tower can be left for long periods of time without maintenance making them an ideal surveillance piece for a vacant construction site. One CCTV tower can provide large site coverage by connecting to multiple remote wireless sensors. Once an activity is detected on-site this will trigger the near-360 degree camera view with pan, tilt, zoom, focus and live recording in real-time together with images and footage of the activity. Infrared and night illumination can be used to monitor activity in low lighting. Various features can then be triggered such as voice challenge, light activation and response team deployment. These features are all controlled through a mobile network and can be customised on the go. An Alarm Response Monitoring Station can also be utilised to provide additional security measures and action decisions, meaning you can ensure your site is safe even when you are not there. Security lighting can also play a major role in putting off criminals. Simply put, if your site is well lit at night, a trespasser will likely feel more at risk of being spotted than if they can operate in darkness. Be sure to install sufficient coverage around any access points and take care that any lights are not easily accessible, so they can’t be disabled. Alarm

Perimeter Protection during a lockdown Read More »

Banner

Smart homes, smart cities, smart technology

The word ‘smart’ has steadily become part of the norm within the industry and everyday life, but what exactly makes up the different aspects of the smart city? Smart Cities are cities which best use modern, integrated technology services and infrastructure in energy, transport and ICT to respond to the social and economic needs of society. Traditional networks and services are made more efficient with the use of digital and telecommunication technologies, for the benefit of its inhabitants and businesses with less impact on the environment.  Making Smart Cities user friendly and a pleasant experience for all involved is critical and has different challenges and requirements to achieve that. In recent years the rise of the smart home has taken the market by storm. Intelligent devices have been integrated into new housing developments and renovations everywhere. Our homes are now stocked with intelligent devices, like smart thermostats, smart speakers and smart light bulbs. But the trend for intelligent spaces extends far beyond our homes. All around the world, entire cities are also becoming smart.  What are smart cities? A smart city is one that leverages technology to increase efficiencies and improve the quality of services and life for its residents. Smart city initiatives can cover anything from power distribution, transport systems, street lights, access control, traffic management and even rubbish collection. It uses data and technology to make everyday life easier and better for the people who live and work in the city. More and more of us are living in cities, and the geographical nature of cities are increasingly expanding, with people wanting to be in the hustle and bustle of city life, as well as close to work. This means our cities are facing growing environmental, societal and economic challenges, especially with climate change and pollution being a grave danger to our planet. By making cities smarter, we can overcome some of these challenges and make cities greener, more efficient and a better place to live.  This is all possible thanks to the rise of technology trends – trends that allow us to create spaces in which humans and technology interact in a more connected, intelligent and automated way. Trends such as artificial intelligence, blockchain, big data, the Internet of Things (IoT) or autonomous vehicles. Combined, advances like these are changing the world and how we live in it.  Technology Keeping traffic flowing Traffic can make city life almost unbearable, whether it be personal vehicles, taxi services or buses. Technology offers some promising solutions to make the management of city roads more effective. For example, public transport routes can be adjusted in real-time according to demand, and intelligent traffic light systems can be used to improve congestion. In China’s ancient-walled city of Xi’an, they’re adopting an intelligent traffic management system based on Hikvision technology – and boosting traffic flow while reducing journey time.  “Xi’an’s city walls make it impossible to increase the size of the urban area. So it was only through technology that we could allow the modern city to grow and develop,” says Lihu Ma, Project Manager from Hikvision. “A core part of the Hikvision solution involves our AI-powered video technology.” The Xi’an traffic police worked with experts from Hikvision, as well as urban planning experts, internet service providers and other technology companies, to design and implement an intelligent traffic management system. The construction of this system fully utilises Hikvision’s core advantages in urban transportation intelligence, employing AI-powered video to create a powerful traffic sensing system. “Effectively, we are building a bridge between an intelligent digital world and the physical urban transportation network in Xi’an,” explains Lihu. Using city resources more efficiently Wi-Fi networks, broadband and IoT are becoming dominant factors everywhere, smart cities must use these resources to analyse the city needs more appropriately.  For example, the city of San Nicolas de los Arroyos, in the Buenos Aires district of Argentina, has deployed IoT solutions from Telefónica to enhance the quality of life of its inhabitants and the urban environment. Seeking to transform itself into a smart city, the municipality is using mobile connectivity to help it manage its workforce and its vehicle fleet: mobile-connected GPS trackers for employees and vehicles help the city administration to optimise the deployment of resources. The municipality now knows in real time where all its connected vehicles are, enabling it to coordinate their movements, save on fuel and maintenance costs, and reduce the likelihood of traffic accidents Improving energy efficiency As well as investing in clean energy sources, such as solar energy, hybrid cars or diesel tax, smart cities also use technology to help closely monitor real-time energy use and reduce energy consumption. For example, across many countries in Europe, homes are being provided with smart energy meters, free of charge, that are designed to incentivise reduced energy consumption and costs. EDF Energy relies on smart metres to reduce overall cost as bills are no longer based on estimates from the size of the house. It also enables home owners to track how much energy they are using. Similarly, in New York, upgrading street lights to LED technology, which allows the lights to be adjusted or dimmed based on real-time data is another example of smart technology being used to increase energy efficiency in an urban scale.  There has been multiple new legislation being implemented across the board, in housing, automobiles, supply chain and office buildings, that is aimed at improving energy consumption. Smart intelligent devices that accurately use supply and demand data have become increasingly popular for cost-efficiency and ease of installation. Something as simple as lighting, whether it be in the streets, in warehouses, or in domestic/urban buildings, may have an upfront cost, but can dramatically increase savings over time.  Making cities safer Thanks to the vast spread of Wi-Fi connectivity, IoT technologies and CCTV cameras, cities are able to harness technology to improve resident safety and boost incident response times. Surveillance, and biometrics have taken the market by storm, particularly recently due to the Covid-19

Smart homes, smart cities, smart technology Read More »

Facial Recognition in a post-Covid world

The Coronavirus pandemic has completely changed the way the world works and lives, and many organisations are already receiving the benefits of biometrics technology As the current COVID-19 pandemic sweeps the globe and dramatically alters society, governments and corporations are turning to novel uses of biometric technologies to limit contagion and maintain economic opportunities. Technologies that may have once seemed like the product of science fiction—such as thermal facial recognition, remote fever detection, or smartphone-based immunity certificates—are now not only possible but also already in use. This raises important questions about the potential privacy implications of the widespread collection and use of such personal data.  This is particularly necessary to note when taking into consideration personal data stored and distributed amongst emergency and police forces. Typically, if it creates a safer and smarter city, the public does not oppose the use of personal data in this way, however when used in urban environments, travel, such as airports, and organisations, this breach of personal data becomes problematic when data is likely to be used, sold and distributed externally.  The Coronavirus pandemic however, has created an alternative reason for biometrics and touch free access control to rise. The use of facial recognition particularly, for security and access concerns has become increasingly popular due to the minimising of the spread of the disease. This use is particularly enhanced when also considering thermal imaging with surveillance and facial recognition. This not only creates a contactless method, but can also analyse potential threats and risks as a core symptom of the Coronavirus is a high temperature, which can be detected by this type of technology.  Facial Recognition Recently, companies have been upgrading their attendance management tools to go touchless. Because of how easily Covid-19 is spread through contact on surfaces, this has been a rapidly expanding method of checking in. This is not the first appearance of facial recognition replacing older, more traditional methods of checking in. In fact, in airports, the use of touchless screening is being adapted at checkpoints like baggage drops and gate check-ins. This will most likely become the norm as the world is reopening after the initial outbreak of the Coronavirus. Facial recognition is not the only technology that might start to be more common, though. Other forms of biometric scanning, like iris recognition, are likely to become more popular as the world is transitioning away from high contact point check-ins. This means that things like fingerprint scanning could become a thing of the past as we step into a more health conscious world. Although it is the safest way to check guests or users in and out, the widespread use of biometric technology is somewhat controversial because of privacy violations. There are currently a few laws that discourage the frequent use of biometric technology as it breaches private information.  Several other laws have been amended in recent years for a similar end product as biometric technology became more popular. However, that was before the COVID-19 outbreak made business owners across the globe reconsider how many touchpoints their office really had. Experts don’t think that this is the last we will see of the Coronavirus, though. It is widely believed among health officials that another outbreak is not only possible but likely. In the short term, the expansion of novel multimodal biometric surveillance may be partially excused as a necessary technological compromise to protect health and safety by bolstering our capacity to manage contagion and prevent future pandemics. However, the concession of such sensitive data (and the personal information it may reveal) opens new avenues for misuse and suggests the need for responsive, responsible policymaking at this time. If governments can put in place valid laws around the handling of data with biometrics then facial recognition technology is sure to become a staple in the regular world, as it negates many security risks that are common with password, keys or identity card security measures.  Even before the pandemic, Mohammed Murad, Vice President of Global Sales and Business Development at Iris ID, a provider of iris recognition solutions, said that much of the market was already clamoring for contactless biometrics and that this will only serve to further increase that demand.    “We feel very strongly that under the circumstances now and previously, in the majority of cases, customers do want something that is non-contact, accurate and frictionless,” Murad said, adding the contactless biometrics are going to play a crucial role in future access control applications.  Similarly, Vince Gaydarzhiev, Founder and CEO of Alcatraz, whose solution leverages a combination to facial recognition and artificial intelligence (AI) for access control, states that products that require physical touch are going to be phased out by many organisations moving forward and will likely not even be specified for most projects. “The importance of biometrics, especially those that don’t require any (physical) interaction will be key in the future,” he comments. Fingerprint Technology Although contactless biometrics will likely be the preferred modality for access control and other use cases in the future, other technologies, such as fingerprint, vein pattern recognition and other solutions that rely on physical contact with a reader won’t go completely away. All biometrics have a role to play, but it depends on the application it’s being used for. For example, if you’re providing access control to a building, moving forward you would likely consider having the least amount of contact with a particular device, so you would lean towards a contactless biometric, which is face and iris. Many people may still be comfortable using fingerprint technologies on their phones or locks for their home, but currently it is seeing a decline in the enterprise market. Post-Covid, we are most likely going to see a dramatic shift in the negative direction (for fingerprint biometrics) because people are going to be quite hesitant to touch things that other people have touched. Touchless biometrics, such as facial and iris recognition, will likely become much more popular. Covid-19 has completely revolutionised the world of security

Facial Recognition in a post-Covid world Read More »

shutterstock 436600507

Interoperability and the future of security

Per Björkdahl, Chairman, ONVIF Steering Committee provides the industry with his insight into how COVID-19 has impacted the industry and what further developments we can expect Security Buyer Features Editor, Rebecca Spayne, catches up with Per Björkdahl, Chairman, ONVIF Steering Committee, virtually to discuss the industry impact of the COVID-19 pandemic and the future of technological trends through artificial intelligence, IoT and interoperability. How has the COVID-19 pandemic impacted the physical security industry, as it relates to ONVIF? Like many organisations across many industries, ONVIF has shifted the way it conducts business and how we collaborate and innovate as a standards organisation. In a global industry with geographically dispersed partners, many of us relied heavily on in-person interactions and face-to-face meetings at large events. However, the security industry has had to pivot to the virtual space. Whilst ONVIF was already familiar with frequent online meetings and interactions that filled in the gaps, like many we are missing the nuances that come from in-person meetings. Going beyond in-person meetings and the shift to virtual events, the security industry is seeing a renewed focus on technologies used to mitigate risks associated with COVID-19. Such technologies, such as occupancy management, automated visitor management and touchless access control applications are increasing in demand, which in turn is increasing the demand for interoperability as organisations seek to deploy best of breed solutions. Will 2021 see any further developments in the fields of cloud, Artificial Intelligence and IoT? As of right now, the security industry is leaning heavily towards customised applications dealing specifically with pandemic related solutions – many of which fall within Artificial Intelligence and IoT. The rise in connected devices and demand for integration of smart applications is accelerating at the same time when the technologies are becoming increasingly more mainstream. The increased focus is leading to more investment in analytics, as people search for solutions to help them adapt to the new normal, reopen economies and reboot infrastructure. Though cloud is by no means a novel technology to the security industry, video storage in the cloud will continue to see growth in non-security markets. All this is driven mainly by growing possibilities in the IoT space. By offering cost-effective solutions and increased flexibility, cloud offers a variety of opportunities for small and mid-sized businesses, as well as enterprise organisations. It should be said that these benefits are only heightened by the COVID-19 pandemic, as many organisations are reevaluating traditional usage of their existing technologies, whilst also seeking other methods to assist with day-to-day operations. These capabilities can assist businesses in remote monitoring of their vacant spaces or providing additional coverage where less staff onsite is required.  How is ONVIF working to further interoperability in the smart applications sectors? The draft profile, or Release Candidate for Profile M, which we announced in September 2020, will prove to be a crucial component for organisations seeking best of breed solutions for their smart applications. Profile M paves the way for increased interoperability of IP cameras or analytics applications with video management systems, allowing users to mix and match analytics and camera hardware and software from different providers. By standardising the communication of metadata amongst these devices and clients – whether an on-premise system or in the cloud – Profile M provides an easy integration path into IoT systems, with a way to link devices such as IP cameras into building management or other business intelligence platforms. The rise in the number of smart applications for security, business intelligence and IoT devices is driving interoperability demands. To meet those demands, devices and clients conformant with Profile M will encourage further growth in the number and types of applications – resulting in even greater choice for end users ONVIF has made some major advancements in 2020, with some new draft profiles as well as changing the way you develop specifications using open source. What can we expect in 2021? In spite of the challenges presented by the COVID-19 pandemic, we were successful in our plans to release draft profiles, Profile D for access control peripherals as well as Profile M. Additionally, we adopted open source development via the GitHub platform to streamline the specification development processes of ONVIF and make it easier for the industry at large to contribute to our core specification work. For 2021, we are excited about the possibilities that Profile M will bring in terms of market potential for smaller, innovative companies in the analytics space and for end-user freedom of choice. Similarly, Profile D will expand the opportunities for adoption of ONVIF interfaces in the physical access control as it allows for the addition of myriad of access control peripherals – licence plate recognition cameras, entry systems, and different types of card readers and sensors – into an ONVIF conformant access control system, regardless of the device or client manufacturer. In the historically proprietary access control realm, this opens up great possibilities for end users in terms of being able to select the most appropriate technology for their application. Also in 2021, we are highlighting some interesting features of the ONVIF specifications that are not part of our specific Profile concept. For example, our Export File Format enables law enforcement to more efficiently conduct forensic investigations using video surveillance from multiple sources – private or public – regardless of what recording system originally captured the video. This is valuable in the case of activities that are being examined in multiple countries or even in multiple jurisdictions within the same state. This feature works by standardising on a common format in which the recorded video files are exported and providing a video player with which the video clip can be replayed. Also important to this process is that the standardised format will also provide useful exported metadata information – for example, the recording equipment used, export file creation time, the name of export operator and a standardised timestamp – as well as allow the video file to be digitally signed to ensure the

Interoperability and the future of security Read More »

AA Incedo Business smartbuildings PR highres square

ASSA ABLOY: The future of access management

ASSA ABLOY Opening Solutions recently launched Incedo platform-based access management solution that will meet the changing landscape. Stephanie Ordan discusses the security landscape for the future of access control. When you look at the access control market, what major forces do you see affecting it in the next few years? We are on the brink of significant change in access control. In fact, change beyond access control. It is becoming ever less useful, from a forward-looking perspective, to talk about building management functions in isolation. Rapid urbanisation and technological change mean systems are being used simultaneously, every day, and often with unnecessary duplicated administrator workload across platforms. As manufacturers in the EMEA security market for many years, our challenge is to develop solutions which create a seamless experience for security managers and building users. So providing intelligent seamless solutions designed to meet the changing needs of our customers is critical in this fast moving environment. It is forecast by analysts TechNavio, that the demand for Access Control as a Service (ACaaS) will grow at 22% annually through 2022. Technologies like wireless locking and secure mobile keys on a smartphone have now become mainstream,  and make electronic access control increasingly attractive to small and medium-sized businesses. How would you define a smart building that provides a seamless experience? A smart building needs an ecosystem where data flows in every direction. Intelligent analytics track use, the environment and more data points to make better, automated decisions in real time. The way we live, work and move continually evolves. At ASSA ABLOY Opening Solutions EMEA, we understand that when it comes to securing your doors and spaces, adapting to diversity is everything. Flexibility and simple scalability allow security and other building functions to facilitate the changing ways we move in and through buildings. Smarter buildings deliver many concrete benefits. For example, commercial buildings currently waste up to half of their energy consumption. Smart energy management can help to minimise this waste. Access control has a role here, because if your building management system knows who is present, it can modify heating or cooling systems automatically. This optimises the thermal comfort for occupants, while reducing energy consumption, cost and overall carbon footprint. This only happens when your systems are joined up.  The European Council for an Energy Efficient Economy estimate smart building technology will reduce energy use by at least 15%. Automated controls and smart software are the key ingredients. Recent research by commercial property experts JLL identified a rent premium of between 8% and 10% for smarter, more sustainable office buildings, alongside lower vacancy rates. These efficiencies go part of the way to explaining why. You are talking about integration, then? This is a growing trend in access control and security over many years. At ASSA ABLOY Opening Solutions EMEA, we have long pioneered the benefits of integration. Our award-winning Aperio wireless locking technology, for example, is integrated with access control systems from over 100 different manufacturers. The next generation of buildings demand we take another big leap forward. Across multiple industries, leaders identify “ecosystems” as the main driver of change for their existing business models. Security is no different. Building administrators want a single solution, available everywhere, which unites all the functions relevant to them: access, locking, CCTV, energy management and everything else into a single, powerful, flexible software environment. The latest access control software report from Omdia Technology says: “Access control software will play a critical role… for future innovation”. Our new Incedo ecosystem is the logical step: its first iteration for commercial businesses is called Incedo Business. Incedo is a universal ecosystem combining software and hardware into one agile environment. An environment powered by data, connectivity and seamless integration, across secure, connected access points and intelligent identification technologies, and across the doors and spaces we use every day. Despite the extraordinary shared global experience of early 2020, ours will continue to be an age of ceaseless, evolving movement. Given access control is what makes the movement of people safe and comfortable, our systems must move with it. Every end user who touches Incedo, even if they never know it, will enjoy easier access and more flexible security in their everyday lives. We can advance, change, evolve — and move. Together. Clearly, the Incedo launch is a big step for ASSA ABLOY Opening Solutions EMEA. How does the new system work? Incedo is an ecosystem, based on a true platform. This will be the place where you combine and manage all the electronic security devices and systems within your building. It is modular, making it flexible and easily scalable — in any direction. You pick the most suitable options from a growing range of Incedo-enabled security and access control hardware. Trusted, award-winning ASSA ABLOY wireless digital locks and wired ASSA ABLOY wall readers secure interior and exterior doors. Also already available, a choice of card and token credentials helps users enjoy safe and convenient access to, and movement around, your premises. Incedo mobile keys let you open doors securely with a smartphone. Incedo’s system management options — Lite, Plus and Cloud — run from entry level up to cloud-based administration. You can manage multiple sites and third-party integrations, including CCTV, when these options become available. Scale up and down, add or remove hardware and credentials on demand — or switch system management options — all within your single environment. Migration between Lite, Plus and Cloud options is always seamless in any direction, ensuring flexibility and peace of mind. Can you tell us a little more about what customers — new and old — should expect when they adopt Incedo Business? Incedo makes workflows more efficient for everyone, from installers to end users. Facility managers enjoy more control and flexibility than they ever imagined possible — with Incedo Business you are able to scale on demand. System administrators do more within limited budgets: initiating, cancelling or amending access profiles, and monitoring movement around a site in real time. You will never

ASSA ABLOY: The future of access management Read More »

Scroll to Top