Surveillance

Back to school security

As educational facilities return to the new normal, it is important to update cyber and physical security defences to protect learners in a new environment  As educational institutions return to normal it is important to highlight some of the biggest security risks that the sector is facing. One of the biggest being cybersecurity, as a lot of work will continue to be communicated and completed online.   A major priority for educational institutions is defending networks from intrusion and protecting the personal information of students, alumni and employees. Why do school administrators and educators need to know this? Because schools of all kinds – from primary through secondary and higher education — now have databases full of personal information about faculty, staff, and students. To cyber criminals, who are not fussy about whose data they steal, these repositories of personal data make an appealing target.  An additional priority is meeting the auditing and reporting mandates for a potential patchwork of federal and state privacy laws. The key for educational institutions to meet all of these information security demands is to proactively implement security controls and best practices, rather than taking a reactive approach and responding to short-term requirements.  With such a broad range of large, small, public and private institutions, there is no one solution that is right for everyone. There are certainly a range of information security products and services to help meet regulatory requirements and reduce the risk of a data breach. Educational institutions without a dedicated security operations center can rely on managed security monitoring & compliance services to provide the expertise to meet regulatory requirements and implement industry best practices.  Here are our 5 security considerations that are key:  Layered defences Do not expect one security product alone to protect you against every possible threat to your systems and data. Of course you want to make sure you have an anti-malware suite on all parts of your network (don’t forget smartphones, Android tablets, Linux servers, and Mac computers along with your Windows machines). But you should also have a firewall at the gateway to your school’s network and on all your individual machines –those you own, those owned by grants, and those owned by your students, faculty, and staff. Any important data, such as grades, finances, or personal information, should be encrypted both in storage (both on servers and workstations) and any time data leaves your machines, like via email or on devices like smartphones or USB sticks.  Implement the principle of least privilege The principle of least privilege simply means that no person, machine, or system should have access to things they don’t strictly need. For instance: student financial data should be in a different part of the network, and completely cut off from people who don’t need to access it. And very few people, if any, should have administrator-level access rights on their own machines (some people are shocked at this suggestion, but that’s one way we manage our machines here at ESET – and if they must have admin rights, they shouldn’t be using that account except when they need to do admin tasks). Any time you can restrict access without disrupting people’s ability to do their jobs, you should.   Update, update, update Applying updates and patches for all software is one of the most important things you can do to minimise the vulnerabilities criminals can use to silently get into your machines. When managing complex systems there may be a case for testing updates before rolling them out, but keep delays due to this process to a minimum. The bad guys are constantly probing for unpatched vulnerabilities. And don’t forget that it’s not just your operating systems and applications you need to keep patched; there are the helper apps that your browsers run, from Java to Flash to Acrobat and beyond.  Indeed, the risks of not patching as quickly as possible probably far outweigh the benefits of testing. If an immediate system-wide rollout is not practical, at the very least initiate a rollout of patches immediately on a small set of representative machines, then expand to greater subsets as soon as practical until all machines under your control are patched. [Getting the machines you do not control patched is a wholly different problem; consider blocking logons to your networks (with appropriate notices beforehand and when actual blockage occurs) to any machines that have not been patched, at least for critical vulnerabilities.  Passwords are not enough If you’re protecting lots of personally identifiable data, a password alone may not be enough. Consider implementing two-factor authentication or 2FA. This can be a biometric, like a fingerprint, or a one-time pass code that is provided to users via a small digital key card or fob. A more recent development is the use of smartphones to deliver one-time pass codes to users and these systems can be relatively inexpensive yet highly secure. Students who use social networks like Facebook and Twitter should already be familiar with the notion of 2FA, as those services use it to prevent unauthorised access.  Make a clean break When employees leave and students move on, be sure to adjust their credentials accordingly. In many cases this will mean terminating their access to school systems. The use of “lingering” credentials that should have been revoked is one of the most common forms of “insider” abuse of systems. In addition, a review of authorised user accounts should be done at least once a year to weed out access that is no longer appropriate.  Surveillance and security   The safety of students and staff is vital for every school. The distinctive quality and flexibility of network cameras effectively reduce the threat of harassment and violence. Suitable for monitoring school playgrounds, hallways, gyms, lunch areas and classrooms, they ensure the safety of students and staff, and prevent damage to school property.  With an increasing focus on everything from bullying, to medical emergencies and vandalism, campus security is more important than ever. Administrators understand that they’re not

Back to school security Read More »

InnoSenT

Ask the Expert: Detecting the benefits of radar

Dr. Eva Maria Buchkremer, Head of Product Management, InnoSenT talks exclusively to Security Buyer about the ins and outs of radar technology Since product management was established at InnoSenT in 2018, Dr. Eva Maria Buchkremer has an important role within the company. She is the contact person for innovation projects in the field of industrial radar sensors and has been pushing the product development. She is the interface between the market and R&D. She identifies unsolved customer problems, picks up on trends and specifies requirement specifications for product innovations in coordination with the radar experts. She is genuinely interested in identifying and satisfying customer needs. With her strong scientific background as a doctor of natural sciences, she was trained to collect and cross-link information, stay open-minded and adaptable and find creative and innovative solutions.She started her career in the medical technology field, always in positions that strived for a strategic approach. As Head of Product Management, she now rethinks radar technology for an ever-widening field of applications. She defines future product strategies and aligns the current portfolio with customer needs and market interests. What are the benefits of radar technology? Like any other technology, radar has strengths and weaknesses. The benefits of radar technology are: a high robustness in harsh environments – radar can therefore be used in indoor and outdoor environments the ability to measure several parameters (velocity, distance, angle of arrival, signal strength) – radar can therefore be used for applications varying from level measurement where only the distance to the substrate is determined up to complex scenarios like intersection management where the vehicle class, localization and trajectory of many road users are determined radar penetrates some materials and the sensors can therefore be hidden behind coverings – this is an advantage when vandalism or design factors play a role in the application radar is a contact-free technology – this is an advantage in any application where hygienic aspects are important Could you explain a little bit about how radar works? Radar devices use electromagnetic waves to locate objects within their field of view. A radar antenna actively sends a signal which travels by the speed of light in a defined direction. As soon as the signal encounters an object, the radar wave is reflected and part of the energy bounces back. If the distance between the antenna and the object changes, the receiving antenna notices a change in frequency, called Doppler shift. The magnitude of the differences between emitted and received radar signal and the travel time give information about the speed of and distance to the object. Radar can be used for many different industry verticals, which tends to be the most popular and why? Radar is an established technology in applications such as door opening, escalator control, speed signs and movement detectors. It offers a contact-free technology, delivers all data needed to solve these applications and works under outdoor conditions. In security applications, depending on the needs, simple radar motion detectors are used or more complex radar sensors for localizing and tracking people. The fusion with a second technology is becoming more popular. Radar offers benefits that are complementary especially to PIR sensors and cameras. A fusion thus enables new functions such as focusing the camera on an object by using the distance information of the radar or compensating the bad performance of PIR when the object is moving towards the sensor – radar is especially good in detecting movement that is headed towards the sensor. A vertical that is becoming more important for radar is the wide field of robotics. There is a rising demand for sensors in this industry in order to facilitate autonomous driving and enhance the safety of machinery. How has Covid-19 enhanced the need for perimeter protection, especially at sites where security is accessed remotely? Covid-19 presents us many new challenges in our private and work environment. The changes caused by the pandemic call for completely new technical solutions such as sensors for contactless operation, the development of it is now gaining momentum. Due to the pandemic measures, many are working from home. The office buildings or company premises are abandoned and, this also applies to the security staff, only minimally manned. So it seems logical that the demand for perimeter protection will increase. The technology must of course be extremely reliable if no one is checking the situation on-site or is following a live video stream remotely. We guess that this will increase the interest in high-end systems enormously and promote innovation. But the variety of products for perimeter protection is also expected to increase due to increased use. Every location has different requirements and customers want the ideal security solution for a wide variety of applications. Customizability and different ranges are required in order to increase efficiency and reduce false alarms. What type of data can be gathered from radar sensors in particular? With radar you can determine the speed, movement direction, distance and angle of moving or stationary objects. So with advanced radar technology it is possible to detect the presence, localize their position in a 3D-environment and follow the movement of objects with tracking algorithms. How do you stay innovative in a continuously evolving industry?  For new products, we strongly focus on unsolved problems in the market and work towards solving these. Our aim is to provide prototypes rapidly so we can involve our customers in the development at an early stage. Where do you see the future for radar technology going? The broadening use of MIMO technology and the opening of new frequency bands with higher bandwidths increases the resolution capabilities of radar and thus opens up new application spectrums and markets for radar technology. Safety-relevant applications benefit from the robustness of radar technology and thus harsh environments can be equipped with safety systems based on radar. In other applications such as alarm systems or autonomous driving, the fusion of technologies that compensate each other’s weaknesses is most promising. Because of its industrialisation, radar

Ask the Expert: Detecting the benefits of radar Read More »

Rewards and tech knowhow with Dahua Partner App

Installers and integrators are set to benefit from Dahua’s new Partner app, which is available to download free of charge. The app is loaded with information to help installers specify the most appropriate products for their projects. This includes detailed product specifications and comparisons, a range of ‘how to’ videos and documents exploring common technical issues which are searchable by category, and the latest news about Dahua products and services. A key feature of the app is providing technical support via an interactive Q&A function, so that installers can receive personalised support from Dahua’s local tech experts. It also provides a range of useful calculators, such as for selecting lenses and working out bandwidth capacity. In addition, installers can claim rewards* in the form of Amazon vouchers by scanning the barcode of any Dahua product they have purchased, and can take advantage of products currently on promotion. The app includes access to account details showing rewards earned so far, and enables installers to register their projects to receive priority technical support. “The partner app demonstrates that Dahua is at the forefront of providing easy-to-access and relevant product and technical information and support in an up-to-date and accessible format,” said Michael Lawrence, Dahua’s Marketing Director for UK & Ireland. “In addition, it provides exciting incentive and rewards schemes so that installers benefit further from selecting Dahua products and systems for their projects.” The Dahua Partner app is available from the App Store and Google Play.   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitynewsdesk.com

Rewards and tech knowhow with Dahua Partner App Read More »

Rewards and tech knowhow with Dahua Partner App

Installers and integrators are set to benefit from Dahua’s new Partner app, which is available to download free of charge. The app is loaded with information to help installers specify the most appropriate products for their projects. This includes detailed product specifications and comparisons, a range of ‘how to’ videos and documents exploring common technical issues which are searchable by category, and the latest news about Dahua products and services. A key feature of the app is providing technical support via an interactive Q&A function, so that installers can receive personalised support from Dahua’s local tech experts. It also provides a range of useful calculators, such as for selecting lenses and working out bandwidth capacity. In addition, installers can claim rewards* in the form of Amazon vouchers by scanning the barcode of any Dahua product they have purchased, and can take advantage of products currently on promotion. The app includes access to account details showing rewards earned so far, and enables installers to register their projects to receive priority technical support. “The partner app demonstrates that Dahua is at the forefront of providing easy-to-access and relevant product and technical information and support in an up-to-date and accessible format,” said Michael Lawrence, Dahua’s Marketing Director for UK & Ireland. “In addition, it provides exciting incentive and rewards schemes so that installers benefit further from selecting Dahua products and systems for their projects.” The Dahua Partner app is available from the App Store and Google Play.   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitynewsdesk.com

Rewards and tech knowhow with Dahua Partner App Read More »

Fighting invisible enemies

Surveillance is one of the biggest connected systems contributing to smart cities. How can smart surveillance tackle health risks and dangers in smart cities Ghosts, dark powers and curses: all classic elements of many scary movies, and examples of why it doesn’t take something visible to scare people.  We have a natural fear of dangers we can’t see, and for good reason. How do you defend yourself against an invisible enemy? But what has this got to do with smart cities and surveillance? In today’s cities, there are several factors that can turn into a threat of health, safety or even lives. Some are more obvious, like chaotic traffic management that lead to incidents or environmental dangers like fire or flooding. But others are more hidden, yet equally as dangerous to people’s health or a city’s livability. However, a smart city wouldn’t live up to its name if there wasn’t a technology-based solution driven by data that could help tackle these dangers – and that’s advanced surveillance systems. In combination with sensors, audio and analytics, they become the tool to monitor and mitigate the risks and help to protect the health and safety of citizens in smart cities – even when the ‘enemy’ seems invisible. Andrea Sorri, Segment Development Manager Smart Cities at Axis Communications discusses exclusively for Security Buyer  how surveillance solutions tackle health risks in smart cities. Mission health and safety: The risks in smart cities and the tools to fight them Health and safety of residents are closely intertwined with the overall livability of a city, and often factors associated with health, well-being and a feeling of safety score highly in ratings of the world’s most livable cities. City authorities therefore need a keen focus on all aspects of urban life that can impact the well-being of citizens, from air quality to rates of crime. Indeed, with more of the world’s cities using the UN Sustainable Development Goals to define their progress, the smart use of technology and data is an imperative rather than an option. Smooth traffic flow in smart cities With the increasing population in urban areas, there’s also been a growing number of cars on the streets – according to the European Automobile Manufacturers Association there’s currently an average of two cars per citizen in the EU.  Therefore, traffic management has always been a key topic for smart cities with the goal to keep the streets safe – for drivers and pedestrians – without hindering the traffic flow (which in itself can have a significant impact on air quality). This is where surveillance systems in combination with analytics come into play. Safety first Surveillance cameras along key traffic routes turn them into smart traffic-detection sensors. They provide a real-time view on the vehicle flow and incidents, which might disrupt the traffic flow across the city or put people’s safety at danger. Systems can be used to detect queues and support pedestrian dynamic and safety, while they’re walking or crossing streets, as well as monitors for accidents or other violations like wrong-way drivers. In cases like the latter, the real-time feature is crucial as every second can make the difference to prevent a fatal accident and protect citizens. If the cameras detect an incident, an alert is sent to the operators to verify the case and send the needed forces to the location – either to resolve the issue or provide medical assistance as fast as possible. Additionally, the information collected by these devices allows Traffic Management Centres to adjust traffic lights or open additional lanes on highly frequented roads to level the traffic flow. Broader health issues Outside of the direct safety risk, poor traffic management brings broader health issues. According to the World Health Organisation (WHO) and the European Environment Agency (EEA), the exposure to high levels of air pollution can cause severe health issues – from obesity, dementia and respiratory infections to heart disease and lung cancer. It’s seen as the single largest environmental risk in Europe. Ensuring a smooth and regulated traffic flow across the city also leads to a decrease of congestion and, thus, vehicle emissions. Surveillance cameras as advanced traffic sensors can, therefore, become important complementary tools to help improve the air quality for citizens. Parking management’s role Related to the broader subject of traffic monitoring is parking management. Poor parking management causes stress for the residents and contributes to traffic congestions, if vehicles are driving slowly through the streets looking for a vacant space. Often, this results in people parking illegally, which is not only inconvenient for other road users, but can quickly become a threat to life and safety. For example, if emergency service vehicles or crucial access roads to hospitals are blocked, the situation can become life-threatening. Network surveillance cameras, which are already implemented in many cities, can be enhanced with specific analytics applications. Detection zones can be pre-defined to trigger automated alerts should an unauthorised vehicle stop in the area for too long. The alert is then, for example, sent to law enforcement, so they can resolve the situation. The combination of analytics and cameras can also be used to guide drivers to vacant parking lots to prevent illegal parking in the first place.  Smart, safe and silent – controlling noise pollution with surveillance We talked about the issue of air pollution in urban environments, but there’s another invisible factor that can damage citizens’ health: noise. In cities, noise pollution is the second most dangerous environmental threat of the modern day for people’s health and safety, according to the WHO.  In most European countries, more than half of the population is exposed to a harmful level of traffic noise, which can cause detrimental physical effects, such as respiratory agitation, gastritis and even heart attacks. The EEA estimates that a long-term exposure to noise above 55 decibels contributes to 48,000 new cases of ischaemic heart disease every year across Europe.  A combination of high-quality microphones, acoustic sensors, AI analytics and video cameras can help to

Fighting invisible enemies Read More »

360 Vision Technology PTZ cameras now with integrated AMG media converter

360 Vision Technology, the UK manufacturer of  HD, radar and thermal PTZ imaging cameras, have announced a technical partnership with the UK manufacturer of Ethernet transmission solutions, AMG Systems; to create a range of integrated PTZ camera/media converter solutions. Available on Predator and Invictus camera ranges, the technical partnership enables 360 Vision to integrate the AMG250 Series industrial media converter PCB into the cameras for long distance video and control data transmission, via connectivity to fibre-optic cable. Capable of supporting all fibre types, the integrated AMG250 media converter provides high bandwidth support via a Gigabit or Fast Ethernet copper port, and 1 x multi-rate 100Mb/Gigabit uplink via an SFP port. The single channel converter  provides maximum video transmission flexibility. Catering for single or dual fibre LC connectivity, the media converter’s onboard SFP module slot allows for an optional media-specific transceiver to be used, to connect to fibre-optic cable. The AMG hot-pluggable optical transceivers available allow transmission of up to 2km (singlemode LC or multimode LC), or 20km (singlemode LC), at a speed of 100Mb/s. Harnessing the power of fibre-optic network infrastructure, 360 Vision Predator and Invictus cameras with integrated AMG media converter can be used to deliver a high-performance, end-to-end surveillance solution for Public Space, traffic, retail, and border control surveillance applications. “It’s great to be working with a world-class UK camera manufacturer of the calibre of 360 Vision,” says Steve Clarke, MD at AMG Systems. “Making the ideal partner for 360 Vision’s high-performance PTZ cameras, for ease of installation, the integrated AMG250 Series media converter is Plug and Play, requiring no user configuration and along with auto-negotiation (802.3u), the device automatically determines the best connection speed. In addition, the AMG250 Series meets or exceeds industrial standards for shock, vibration and temperature change, ensuring maximum reliability over a wide (-40°C to +75°C) industrial temperature range.” “Providing maximum installation versatility, with fast & simple set-up, the integrated AMG media converter is the perfect fit for our range of Predator and Invictus cameras, with the product combination delivering the highest levels of surveillance imaging and video transmission performance,” says Sara Fisher, 360 Vision Technology’s Sales Director.  “We’ve very proud to be working with a UK transmission manufacturer whose technical performance, build quality and support values are so closely aligned with those of 360 Vision.”   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitynewsdesk.com

360 Vision Technology PTZ cameras now with integrated AMG media converter Read More »

Webinar: Guiding the surveillance industry through innovation

  Seagate talks to Security Buyer about the most anticipated upcoming webinar in the surveillance industry discussing storage solutions, trends and ecosystems What can we expect to be covered in the webinar? Seagate, Axis and Milestone are participating in the webinar. We’re all leading experts in our respective fields within the surveillance industry. What the listener can expect to hear about is technology evolutions, ecosystem partnerships, new trends and the need for more robust and scalable storage architecture. You’ll hear about Seagate Solutions to some of the challenges, changes and trends that are in place at the moment and how we’ve prepared ourselves for the future. You’ll hear how Installers and End Users can get closer to Seagate and these Alliance Partners, and prepare themselves for the best-in-class solutions for surveillance for both today, and tomorrow. The Webinar will be an easy going, round-the-table type discussion between the Alliance Partners. Register for FREE here: https://register.gotowebinar.com/register/9098545995423446029  Seagate, Axis Communications and Milestone are all key players in the security marketplace, how are you best positioned to guide and inform the industry? From a Seagate perspective – Seagate, is a market leader in storage for over 40 years, a market leader, which is important. What does it mean to be a leader? It means to be a pioneer of technologies, it means bringing products and pioneering tech to market consistently, and building a reputation of reliability. That is who we are, that is the DNA at our core. 15 years ago, we put a microscope over the surveillance market, we saw that there were challenges from a storage perspective that needed to be met; as a storage leader we will meet these challenges, to guide and inform users and installers, on how to get the very best total cost of ownership (TCO) and performance from a storage perspective. As a market leader, it is also about how we’ve done it, and what we offer from a practical point of view. First of all internally, we have our own dedicated surveillance teams, not just from the perspective of a dedicated EMEA Sales team, but also organisationally within the company. We have a surveillance segment which is dedicated to the market, not the product, but the market. We have teams that are focused on business development, product development & operations management. Uniquely, we have set up a surveillance centre of excellence in Hangzhou, where some of the largest camera manufacturers and surveillance manufacturers are based, for long term R&D and testing. We have committed to a dedicated surveillance track within our Seagate Partner Program for installers. There is a specific track for you within the program, where you can get the latest information, access all the Seagate tools and services that we offer, tailored towards surveillance system installers. With our Alliance Partners Axis and Milestone, we sit down and share our long term road maps, our technologies, challenges we face and what we want to achieve together. With the fullest portfolio of surveillance devices and solutions, we can provide insight and guidance to SMBs and Enterprises looking to scale in their markets. As an example, we have our SkyHawk and SkyHawk AI (artificial intelligence) hard drives that include complimentary Rescue Services for SMBs, for enterprise scale solutions, our Exos hard drives feature Seagate Secure, featuring ADAPT erasure coding to provide best in class, encrypted large scale data sets with the fasted data recovery times, which are 90% faster than RAID configurations. Why is there a need for more robust, scalable storage architecture? Intrinsic to the surveillance industry, is the exponential growth of data creation, which is part and parcel of the surveillance industry. Cameras are more prolific, and produce more data. Those cameras, in their own technology, are delivering higher resolution in both video and audio, resulting in more data. Our EDS solutions come into their own on 500+ camera networks. The technology follows the development of these devices, as we see the real world requirements for AI, the meta data that is being created by cameras, the machine learning where cameras are looking at data and creating data about data, in order to learn patterns on behaviours and identify abnormalities. These trends from the growing requirement for storage that is able to scale, with the need for architecture to deliver scalability with the camera technology and the data demands. Use cases are no longer static, the network grows and expands, that’s today’s norm and that is why data needs to be recorded robustly, encrypted and secured, with the information captured at the device end, being recorded at the storage end. In your opinion, what are the four main technological innovations prevalent today? Artificial Intelligence (AI) – The technology has significantly grown in relevancy and is now a business requirement for a number of verticals to enable high level decision making. With our EDS systems today, they are best placed to manage AI and super-fast streaming with the technology that we have, able to get that data onto the disc, using special algorithms that we have, and ASIC controllers which embed in our EDS systems. Analysing hours and hours of data through machine learning and using AI technology, we can identify what is happening with the data we’re collecting, creating a real benefit to the industry. Connected devices – With IOT the cloud. We’re having cameras that are connected over large areas of deployment, for stadiums, shopping centres, cities, airports… not just cameras, but lots of kinds of different sensors. These are controlled and managed by a centralised VMS, for example Milestone, who will talk about XProtect during the webinar, and how they’re able to manage multiple sensors and pool and point everything together into centralised storage. This is a major technological innovation that enables better decision-making processes and has much greater capabilities when your devices are connected with your access control, for example traffic control management within Smart Cities. Vertical solutions – We are finding new use cases for technologies we already have, identifying specific solutions for emerging industry verticals. These verticals

Webinar: Guiding the surveillance industry through innovation Read More »

Speedy invests £1.6m to support events as industry re-opens

Equipment hire and services provider Speedy, has invested £1.6 million in new fencing and ground protection equipment to support the events industry as it plans to re-open in line with the Governments roadmap out of lockdown. With the investment, Speedy has made 90,000 more units of fencing panels and ground protection mats available for delivery from its 200 service centres across the UK, with selected products being eligible for its Capital Commitment national four-hour delivery service. Speedy’s non-mechanical division specialises in equipment for large events and the company typically hires 300,000 panels annually to music festivals and sports events. The business’s most popular products span ground protection, fencing and barriers, and also include a Noise Defence System that reduces sound pollution for events’ surrounding residential areas. Lisa Blake, category director at Speedy, said: “This investment ensures we can continue to meet the demand for the non-mechanical equipment that will play an important role in supporting the events industry as it begins to re-open in line with the Government roadmap to easing restrictions. “In the last six years, our events team, led by Non Mechanical Director Gary Allmark has provided site security and safety equipment for crowd and perimeter control at the UK’s biggest festivals, plus many other sectors – and we’re proud to be using our experience and established product portfolio to support organisations on the frontline in tackling this pandemic.”   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitynewsdesk.com

Speedy invests £1.6m to support events as industry re-opens Read More »

Protecting the reputation of the video surveillance industry

Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe, explains why he passionately believes that the password protection elements of the Secure by Default standard should be a fundamental requirement for all video surveillance systems. They may occur for criminal or malicious purposes, or just seen as a challenge by opportunistic hackers. Whatever the reason, cyber-attacks are a major issue which could have a significant impact on the reputation of the video surveillance industry. This is why recent publicity about a high-profile security video solutions provider, allegedly taking a casual attitude in terms of restricting who can gain access to end-users’ confidential information, should serve as a reminder for stakeholders in the video surveillance supply chain to work together to promote best practice. Secure by Default Whilst the majority of cameras are not installed for mission critical or high security purposes, there are countless businesses and organisations which are entrusting video surveillance systems to help them protect their assets, people and property. In doing so, they should be able to expect that their confidential data is being kept safe from hackers, which is the main reason why the Secure by Default standard was introduced in 2019 by the UK’s Surveillance Camera Commissioner. Hanwha Techwin was proud to be among the manufacturers who were invited to participate in the development of the Secure by Default standard, which has the objective of ensuring security surveillance products are cyber and network secure by default, out of the box. As such, the standard sets out what those of us involved in the video security industry can do to respect customer privacy rights, as well as comply with data protection regulations, such as GDPR. In the simplest of terms, the standard guides manufacturers to adopt an approach which makes cyber-attack protection a fundamental feature of a video surveillance solution that is taken into account at the start of a camera design process and not just treated as one of a long list of useful features. 5 essential elements of password protection Obvious perhaps, but having sound password protection protocols is a good starting point for establishing cyber security best practice. Whilst these need to be easy to implement, having minimum mandatory and auto-enforced standards, such as prohibiting the consecutive use of the same letter or number and encouraging the use of special characters, as well as a combination of letters and numbers, should always be designed into a device’s firmware. It is also important manufacturers do not supply products with pre-configured weak passwords where the user is not required to make changes. These are typically passwords which all have the same letters or numbers. In particular, the Secure by Default standard stipulates the following measures: Whilst no manufacturer can offer 100% guarantees, we would urge consultants, system designers and system integrators to only work with manufacturers who support the objectives of the Secure by Default standard and can demonstrate they fully understand the importance of keeping end-user clients’ data safe by doing their utmost to counter the risk of a cyber-attack. This will include those who have removed a ‘back door’ which might have originally been created to give engineers easy access to a device, but also provides an opportunity for hackers. Look out for manufacturers who recognise the importance of being open and honest with customers when new cyber security threats are identified and are able to move quickly to update firmware to combat them. At Hanwha Techwin, for example, our Security Computer Engineering Response Team (S-CERT) is totally focused on addressing any potential security vulnerabilities in our Wisenet products and solutions. Members of the team have been hand-picked for their expertise in being able to identify, analyse and quickly respond with effective countermeasures to any cyber security threats. Manufacturers should also be using third-party testing agencies to evaluate their products against the latest methods of hacking, as well as offering training to installers and systems integrators which covers the importance of setting up password protection as an essential part of the commissioning process for cameras and recording devices. Summary The ability for countless businesses and organisations, as well as homeowners, to view live or recorded video from any PC on the network or from a smartphone or tablet, has revolutionised how property or assets are remotely monitored.  It has, however, also resulted in data protection becoming a significant issue for the video surveillance sector. The good news for end-users and all involved in the supply chain is that there is no shortage of professional and socially responsible manufacturers whose products meet the Secure by Default standard by being designed with data protection in mind.   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitynewsdesk.com

Protecting the reputation of the video surveillance industry Read More »

Exploring Radar and Thermal camera deployment

360 Vision Technology, the UK manufacturer of rugged PTZ and thermal imaging cameras, will be promoting the application and deployment of radar and thermal imaging at Security Summit 2021, one of the largest virtual security industry events in Europe. Scheduled for 11.30-12.00 (GMT), Wednesday May 5th, the free-to-attend live virtual keynote presentation will be given by 360 Vision’s technology expert, Tony Holloway, on the subject of ‘The application of radar and thermal surveillance technologies for large area security detection.’ In his keynote speech, Tony will discuss the technology, performance differences and considerations for the deployment of radar and thermal detection cameras suitable for large area surveillance applications.  Underpinned by the science behind the solutions, Tony will explore the features and limits, to enable attendees to clearly identify applications for successful deployment. “Following the recent success of our technology learning webinars, we are delighted to have been offered  the opportunity to deliver a technology keynote speech at the Security Summit Virtual Event,” says Sara Fisher, Sales Director at 360 Vision Technology. “In Tony’s presentation, he’ll be looking at how radar and thermal imaging can be successfully specified for use in a variety of large area applications. The presentation will be highly beneficial for anyone interested in deploying a surveillance capability that offers immediate and reliable detection, with simultaneous alert and visual verification.” To register for 360 Vision’s free-to-attend Security Summit 2021 keynote presentation (at 11.30-12.00 GMT, Wednesday May 5th), please use the following link: https://pro.connect2bnet.com/signup   To stay up to date on the latest, trends, innovations, people news and company updates within the global security market please register to receive our newsletter here. Media contact Rebecca Morpeth Spayne, Editor, Security Portfolio Tel: +44 (0) 1622 823 922 Email: editor@securitynewsdesk.com

Exploring Radar and Thermal camera deployment Read More »

Scroll to Top