Home Articles posted by a&s Adria (Page 117)

After a New Name, Hanwha Presented New Strategic Plans

Hanwha Vision, under the new company name, presented regionally customized solutions and a new expansion strategy for the first time at the ISC West and Secon security trade shows.

“As we expand our business from surveillance monitoring to data analysis, we will provide customized information through big data analytics and actionable solutions that not only prevent incidents but also respond to them in real time. Moreover, our vision solutions will be instrumental in advancing customer’s operational strategies,” said Soon-hong Ahn, President and CEO of Hanwha Vision.

Along with its new name, Hanwha Vision also developed its new business strategy, emphasizing its leading capabilities in vision solutions.

First, Hanwha Vision will provide a platform to collect, analyze and integrate data from various devices and sensors, leveraging its partner solutions. By acquiring data collection devices, such as AI cameras and IoT sensors as well as event-detection applications and AI-training solutions, Hanwha Vision will acquire vision data and deliver useful insights through data analytics.

Second, in the area of real-time video surveillance, Hanwha Vision plans to expand the scope of technologies to offer solutions that will not only respond to events but also predict them. Big data collected through various sources will be analyzed using AI and cloud technologies to predict events to provide prevention or early resolution.

Hanwha Vision is expanding into a platform business to provide solutions that can support customers with practical help in various industries. The company will introduce solutions targeting urban safety and traffic management (smart city), process monitoring and productivity improvement (smart factory) as well as efficient store operation and sales enhancement (smart retail). The solutions will be gradually expanded to other industries.

Hanwha Vision, which announced its new name in March, will gradually change the names of overseas subsidiaries, products, and solutions based on its business needs in each market.

Secure Logiq Partner VCA Technology

The global hardware partnership between Secure Logiq and VCA Technology has yielded its first results. Following a period of intensive testing, the manufacturers have fine-tuned their solutions to determine the best combinations of software and hardware from the two brands that will set new standards in the industry.

Secure Logiq and VCA formed their strategic partnership towards the end of 2022. This led to the manufacturer of servers designed for the HD CCTV industry becoming the global hardware partner for the security and business intelligence software manufacturer.

“We’ve developed a great relationship with VCA after working with them for a long time so we know how powerful their analytics solutions are,” says Secure Logiq’s Robin Hughes. “Our R&D teams have been working together to find the optimum solutions to deliver best-in-class results to our shared customers at a price-point that is hard to match.”

“This partnership has always been about overcoming the lack of customer knowledge about hardware options,” adds VCA’s Kevin Waterhouse. “The work we have done together takes away a lot of those customer questions. We can now offer specific solutions based on the needs of our clients safe in the knowledge that our combined R&D teams have worked together to ensure the optimum performance is achieved.”

VCA takes pride in its ability to squeeze a large amount of analytics into a very low amount of CPU usage – an attribute that has come from the on-camera analytics side of its business. This means that the new combined offerings are able to host a variety of VCA applications on one Secure Logiq server, not just security.

With VCA analytics covering a variety of sectors, from traffic management to retail with elements including forensic searches and heat mapping, the combined solution will be attractive to a variety of organizations.

ONVIF’s Double Success: 15th Anniversary and 25,000 Conformant Products

ONVIF, the leading global standardization initiative for IP-based physical security products, continues to deepen its influence and impact in the physical security market with the dual milestones of surpassing 25,000 conformant products and celebrating 15 years as the defacto industry standard for interoperability.

Since its inception in 2008, products that conform to ONVIF profiles have consistently grown in number and scope, beginning with core products such as IP cameras, video management software, and network video recording solutions. Today’s database of conformant products now encompasses intercoms, license plate recognition cameras, and can also include drones, and services such as video surveillance as a service (VSaaS).

“ONVIF has accomplished quite a lot in its first 15 years, but our work is certainly not done yet,” said Leo Levit, chairman of the ONVIF Steering Committee. “As the industry continues to adopt video analytics, Artificial Intelligence, cloud, and IoT, the role of ONVIF as a provider of standardized interfaces in these domains will only become more relevant.”

In all, ONVIF offers seven profiles, including Profile S for streaming video; Profile G for video recording and storage; Profile C for physical access control; Profile A for broader access control configuration; Profile T for advanced video streaming, Profile D for access control peripherals, and Profile M for Metadata and events for analytics applications. Products that conform to these profiles are produced only by ONVIF member companies and must support at least one ONVIF profile but can support multiple profiles for added functionality. Products must be registered under the ONVIF list of conformant products to be considered conformant.

Further information about ONVIF conformant products, including member companies and their conformant models, is available on the ONVIF website: www.onvif.org.

A CLIQ® Go programmable key system simplifies access control for small businesses

London, April 2023 – CLIQ® Go key-operated access management is built to make security easier for small and medium-sized businesses (SMBs). It also offers a new way for locksmiths and business managers to work together for mutual benefit.

In a typical SMB, the budget will not stretch to a security department or a dedicated facilities manager. Yet security demands and key management hassles are no different to those faced by a multinational.

CLIQ Go helps businesses improve their security and manage access efficiently without stress. The system includes mobile access management from the dedicated CLIQ Go smartphone app.

“We designed CLIQ Go to be fast to install, as well as easy to use and administer,” says Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEIA. “As a company, we have a long heritage in inventing and manufacturing key-based locking systems, both electronic and mechanical. CLIQ Go is another milestone in a long line of ASSA ABLOY innovations.”

Access management made easy

Three basic components make up a CLIQ Go system. Doors and other types of opening are secured by a range of wireless locking cylinders. Site users unlock with a programmable CLIQ key. For convenience, one key carries all their individual access permissions.

Finally, a business director or admin assistant can manage everyone’s access electronically from a PC with desk programmer or on the move, via the dedicated smartphone app.

CLIQ cylinders fit any type of interior or exterior opening. Because each programmable CLIQ locking cylinder is powered by the battery inside every programmable key, it can be quickly deployed without cabling or mains power. An installer simply swaps out the existing cylinder for the CLIQ device – it needs a simple 1 screw change.

The CLIQ Go app manages the locking system from anywhere provides the security admin higher flexibility. If a new employee needs server room access, for example, it is simple to make changes in-app and send new permissions to the system via the cloud. Issuing, revoking or amending a user’s access rights is straightforward.

“CLIQ Go transforms your phone into the security team for a powerful access system,” adds Stephan. “Your premises are safer because keyholders only get into specific rooms or at certain times. All unlock events are logged, making incident investigations faster.”

Time-saving for businesses, new revenue for locksmiths

CLIQ Go also gives small businesses the opportunity to draw on the expertise of a local locksmith or security partner — and save even more security management time.

To keep setup simple, there’s no software installation at the client end. A single mechanical coding for all systems helps locksmiths keep keys and cylinders in stock.

To manage a business’ system, the locksmith simply programs and configures a new key using CLIQ Express software. Permissions are sent to the business via the cloud.

“Partnering with SMB clients in this way offers resellers an additional revenue stream: issuing, programming and dispatching new keys on demand,” explains Stephan. “For locksmiths looking to future-proof their expertise, CLIQ Go is a smart way to support SMB clients.”

To learn how your business could benefit from CLIQ Go, download a free solution guide at https://campaigns.assaabloyopeningsolutions.eu/cliq-go

INTERNATIONAL MEETING: MANAGING CYBERSECURITY RISK – ARE YOU READY TO STEP UP?

CREAplus invites all interested parties to join the international meeting on cybersecurity risk management on Tuesday 9 of May 2023 from 9 am to 3 pm at CUBO Golf Ljubljana, Medvode – Smlednik. The event is free of charge for all attendees.

The event is addressed to directors of managed security services providers, managers of security operations centres, CISOs, cybersecurity managers and experts in organisations, CIOs and system administrators.

The event “Managing Cybersecurity Risk – are you ready to step up?” aims to discuss and discover effective solutions and approaches to manage cybersecurity risks and prevent cyber threats.

Attendees will learn about the latest cybersecurity solutions and services, from protection technologies, cybersecurity management, and security intelligence to cybersecurity awareness and training. The event will provide a chance to share experiences, relax, and bond over a round of golf.

MEETING INFO:

AGENDA:

8:15 – 8:45 REGISTRATION

9:00 – 9:05 INTRODUCTION

9:05 – 10:00 PRESENTATIONS:

  • CYNET SECURITY – Comprehensive visibility across all attack vectors
  • PERCEPTION POINT – Uncovering threats in email, collaboration apps & browsers with Perception Point’s advanced threat detection capabilities
  • ADMIRAL CROATIA – customer use case

10:00 – 10: 15 COFFEE BREAK

10:15 – 11:15 PRESENTATIONS

  • STELLAR CYBER – Operating OT and IT security from one platform
  • KELA – The Balkans and Cybercrime – How CTI can help you stay ahead of the game
  • Customer use case

11:15 – 12:15 LUNCH

12:15 – 13:30 PRESENTATIONS:

  • PICUS Security – Continuous threat exposure management
  • CREAplus – Cyber Attack demonstration live
  • CREApro – Artificial Intelligence in Cyberdefence

13:30 – 14:30 GOLF, networking

At every stage of its life cycle, wireless access control can help to save money and reduce energy use

London, March 2023 — Installation, operation and expansion: electronic access control has costs attached to every stage of its lifetime. But these costs are not fixed.

 Choosing wireless over wired locking can play an important role in reducing energy use — and therefore expenditure.

Cost savings at installation: faster, simpler fitting

Savings begin at the very start. Installation stage is the largest contributor to potential cost saving when businesses choose wireless access control.

In calculations for one costings report, ASSA ABLOY experts examined projected costs for a 100-door installation. Labour savings for those who chose wireless versus wired locks were 82.5%*.

Why? Firstly, because wireless installation is much faster. It is also less intrusive. Most wireless locks require little or no drilling around the door, whereas wired access control needs cabling through and partly around a door — which means specialist electrical installers, too.

By choosing a wireless solution, organizations also upgrade building security without inconveniencing staff or disturbing everyday work routines.

Cost savings during use: less energy, better sustainability performance

In 2017 the Harvard Business Review declared energy efficiency one of the “key levers for business success”**. This opinion may be more true now than ever before.

Between 2021 and 2022, non-household energy prices increased by at least 10% in every EU country except one. In Greece, Romania and Denmark, unit prices for businesses more than doubled***. Wireless, battery-powered devices can help protect against increases and volatility.

Battery-powered locks use less energy than traditional wired locks, which normally work via magnets connected permanently to electricity. Wireless locks work differently. They only “wake up” when presented with a credential, to make an access decision.

This translates to an additional saving on energy costs: more than 70%*, or thousands of euros over a typical access control solution’s lifetime.

Other related energy and materials costs during use are also lower. In operation, wireless locks only need a change of their standard battery — which may be rechargeable — typically once every two years. No specialist maintenance is required.

Cost-savings from longer life: reuse and space flexibility

Wireless locks also add flexibility — and can reduce costs — when an organization reconfigures or expands their office space.

High-quality, innovative wireless locks like ASSA ABLOY’s Aperio® range can typically be reinstalled at another door without impacting reliability. They move to wherever is convenient.

If a business is rethinking workspace to encourage flexible or hybrid work patterns, for example, cost efficiencies could be significant****. Typical savings on office relocation or expansion are estimated at around 30%* with wireless over wired locking.

Reducing energy use while extending control: University of St Andrews

As home of the renowned St Andrews Prize for the Environment, the University of St Andrews has sustainability at the heart of its ethos. For student accommodation, university managers sought an energy-efficient access control solution which respected and reflected these principles.

A major challenge facing the university was that multiple different standalone access control technologies had been installed piecemeal at student halls over the years. To upgrade the accommodation, university managers sought a more suitable, integrated solution.

They university chose ASSA ABLOY Aperio battery powered electronic escutcheons. Approximately 1,600 doors so far are equipped with electronic access control — without cabling*****.

The Aperio devices integrate fully and work flexibly with both the university’s existing central system and their student ID card. University security managers continue to enjoy the efficiency benefits of monitoring and controlling access from a single point and in real time, including for doors in multiple buildings.

Energy efficiency and more control with Aperio

In comparison to a wired access control solution, Aperio devices offer significant energy efficiency benefits. Devices are wireless, so can be installed with little energy use and no need for wiring to mains electricity. They consume zero energy when idle and run on standard batteries, consuming little power during operation.

Through an entire product life-cycle, Aperio combines reliability and energy efficiency with cost effectiveness. In doing so, Aperio contributes to the university’s sustainability goals.

At the same time, online integration with St Andrews’ central management system has improved access for all users.

“Aperio gives us central management and control,” says Pauline Brown, Associate Chief Information Officer at University of St Andrews, “and contributes to our award-winning track record in energy efficiency.”

To find out how you could save by making the switch to wireless locks, download a free solution guide at https://campaigns.assaabloyopeningsolutions.eu/aperio-cost-savings

Access control for a new Paris media headquarters uses a suite of connected ASSA ABLOY devices

London, April 2023 – For new headquarters in a Paris suburb, media giant Canal+ specified a connected smart building to enable efficient, flexible working. Choosing the right connectable access technologies can be a time-consuming task, all too often requiring compromises in the name of compatibility.

 “Fast-growing demand for integrated building systems makes it critical for hardware suppliers to offer a range of compatible access solutions,” says Thomas Schulz, Product Marketing Director at ASSA ABLOY Opening Solutions EMEIA.

“ASSA ABLOY’s broad competence and a vast range of connectable access control solutions enables us to match devices to many applications, at almost any opening and in all areas of a building.”

The new access control solution for the Canal+ building filters access to and through all technical areas, for 1,200 employees plus visitors and contractors. No-compromise protection is required for multiple types of door, both internal openings and external or emergency exits.

Canal+ prioritized access control devices which offer high performance in both security and sustainability criteria. Particular care was taken to green interior and exterior spaces — as well as to indoor air quality and exposure to natural light — in order to reduce the building’s energy consumption.

“As soon as we discuss access systems, all service providers tell me about ASSA ABLOY products,” says Abdeljelil Saidi, Director of Safety and Security at Vivendi/Canal+ Group.

Seamless integration with Genetec Synergis

All ASSA ABLOY devices installed at Canal+ integrate seamlessly with their Genetec platform. This integration gives employees the flexibility and convenience of carrying one multi-site credential. From an integrated Genetec control panel, administrators can issue, amend or withdraw access for individual users or rooms.

Aperio and ABLOY locks connect with the smart building system to prevent unauthorized intrusion into sensitive areas.

Choosing the Aperio H100 Wireless Electronic Handle over wired locking devices contributed to improving energy efficiency. Like every Aperio lock, an H100 is fitted without wiring, which saves power during installation. The electronic handle works without mains power, consuming much less energy than a traditional wired door lock.

Canal+ are delighted with performance of their connected Genetec and ASSA ABLOY solution: “We plan to equip new Vivendi Group sites and not just the Canal+ headquarters,” adds M. Saidi.

 The right device for every door, interior and exterior

To secure interior doors, the multi-award winning Aperio H100 Wireless Handle combines security with contemporary aesthetics. Its durable design is perfect for doors with high traffic; the H100 works with online or offline access control systems. A battery slots inside the handle, ensuring a minimal, discreet footprint.

For an even higher level of security at external-facing doors, ABLOY Electromechanical Locks are also fully integrated with the building’s Genetec system. These class-leading door devices offer high mechanical resistance at vulnerable points such as emergency exits.

“Abloy electromechanical locks are robust and efficient,” confirms M. Saidi.

To learn more about ASSA ABLOY’s connectable access solutions, download the reference PDF at: https:/assaabloy.com/emeia-blueprint/market-product-assets/das/assets/AA_Aperio_Case-Study_Canal-Plus_EN_09_web.pdf

Interactive Security Day

Representatives of the companies Cathexis, Sinpro, Secure Logiq, and Suprema invite you to the “Interactive Security Day” conference at the Valmar Diamant Hotel in Poreč which will be held on May 24 and 25, 2023.

The conference is primarily intended for system integrators who can familiarize themselves with the solutions offered by the above companies.

Participants can use the event to discover how they can achieve more with their projects by using several options

  • Advanced security solutions
  • Full project control
  • Unique propositions
  • Benefits of a completely integrated system
  • High availability
  • Forecasting and modeling
  • Low total cost of ownership

About companies

Cathexis is a global video management Software developer. For more than 25 years Cathexis has shown how monitoring solutions can maximize return on investment for security, infrastructure,

and business intelligence management, to positively impact client operations.

Since 2011 Secure Logiq has been developing the missing piece of the HD surveillance jigsaw – servers specifically designed for HD surveillance.

Secure Logiq is now the world’s leading producer of ultra-high-performance HD surveillance servers and is unique in being entirely dedicated to the development of advanced, high-throughput video

data processing and storage technology.

SINPRO is a designer and solution provider that specializes in different application areas, including physical security. As part of the operation, SINPRO provides guidance and assistance throughout the project design, implementation, and training stages.

Suprema is a leading global provider of security and biometrics.

By combining world-renowned biometric algorithms with superior engineering, Suprema has introduced a number of technology innovations to the security industry.

 

NOTE: The organizer covers the costs of hotel accommodation, dinner and lunch!

Date of event: May 23-24, 2023

Venue: Hotel Valamar Diamant, Poreč, Croatia

Applications can be sent to: KaterinaR@cathexiseu.com

 

Axis Communications announces world’s first explosion-protected camera designed for Zone/Division 2 hazardous areas

Axis Communications, a leader in network video, announces AXIS P1468-XLE Explosion-Protected Bullet Camera, the world’s first explosion-protected camera specifically designed for Zone and Division 2 hazardous locations. The camera is designed for Zone 2, 22 and Class I/II/III Division 2 according to international standards (ATEX, IECEx, NEC).

AXIS P1468-XLE uses the ‘Ex e’ protection method, an explosion-protection approach referred to as ‘increased safety’ or ‘non-incendive’. This method ensures that no arcs and sparks can appear, and that excessive temperatures cannot be reached, during normal operation of electrical equipment. As a result, electrical equipment using ‘Ex e’ protection cannot ignite gas or dust in the surrounding potentially combustible environment.

AXIS P1468-XLE is a robust, impact- and weather-resistant fixed camera which delivers excellent image quality in 4K resolution under any light conditions, through Lightfinder 2.0, Forensic WDR, and OptimizedIR. Compact and lightweight in design, the camera is as easy to install as a standard camera.

AXIS P1468-XLE has been designed in line with North American and European directives for equipment intended for use in potentially explosive atmospheres. By design, the camera is unable to provide sufficient energy to ignite gas or dust in the atmosphere to cause an explosion, therefore removing the need for any traditional explosion-protected enclosure.

The multitasking camera provides many benefits within health and safety applications and operational efficiency. Early detection of smoke and fire, ensuring that personal protective equipment (PPE) is being worn and used, and monitoring restricted areas bring significant health and safety benefits to organizations. In operational efficiency, the camera can be used for visual verification of various processes and as part of an advanced data-driven sensory network.

Integrated deep learning for advanced analytics

Built on ARTPEC-8, AXIS P1468-XLE includes a deep learning processing unit (DLPU) enabling advanced features and powerful analytics that run on the edge. For instance, by connecting the camera to the process control system and continuously monitoring a process, you can fine-tune the process in real-time to maximize throughput. In addition, it is possible to extract and send metadata for further analysis, which can be used for trend monitoring and predictive maintenance. Built-in cybersecurity features help prevent unauthorized access and safeguard the system.

Specifically designed for Zone/Division 2 hazardous locations

In contrast to Zone/Division 1 hazardous locations – where the presence of an explosive atmosphere is likely and a regular occurrence – in Zone/Division 2 hazardous locations, an explosive atmosphere is far less likely, less frequent, and present for much shorter periods of time. It is still essential however, to eliminate the risk of equipment creating a spark that might create an explosion in these areas.

Explaining why the company has chosen to create a camera specifically designed for Zone/Division 2 hazardous locations, Jesper Olavi, Global Product Manager at Axis, said: “For customers who have wanted to use video surveillance in Zone/Division 2 hazardous locations, the only realistic solution so far has been to use explosion-protected cameras certified for Zone/Division 1 hazardous locations. But these heavy-duty enclosures are over-engineered and unnecessarily expensive for Zone 2/Division 2 hazardous locations. With the launch of AXIS P1468-XLE, customers will have the chance to bring high-quality video surveillance and advanced analytics into locations where they were previously rarely used due to the prohibitive cost.

“AXIS P1468-XLE highlights the benefits of Axis designing and manufacturing our own explosion-protected cameras. In designing every element of the camera, we can ensure the methods employed for explosion protection are based on an individual camera’s requirements, rather that creating a ‘generic’ enclosure designed to fit many cameras. It’s a process that leads to an optimal solution for specific environments and use cases.”

Axis Addresses Cybersecurity Risks in Software Development with a Native Security Model

Axis Communications, a Swedish company that specializes in network video surveillance and access control solutions, has implemented an internally developed methodology called the Axis Security Development Model – ASDM. The ASDM provides a baseline for cybersecurity by describing different security activities that should be considered throughout the software development phases, with a focus on communication between all stakeholders involved. This includes the setting of application requirements, design and implementation, verification, and deployment. As part of this process, developers, architects, and product owners are held accountable for making critical decisions that are hard to change once the software is fully built.

The ASDM toolbox recommends various security activities such as risk assessment, threat modeling, threat model testing, static code analysis, vulnerability scanning, and vendor assessment. Depending on the type of software to be developed, development teams can choose to either engage in certain activities or avoid them altogether. ASDM provides a risk-based approach, ensuring that security-related activities are conducted when they matter the most, rather than solely focusing on compliance with a process. The goal is to achieve cybersecurity by reducing vulnerabilities and development costs.

This methodology has been developed as Axis acknowledges the existence of security risks such as coding bugs and errors that may lead to security vulnerabilities that could be exploited in an attack. Although it is uncommon in the industry to have error-free software releases, security risks should be identified and addressed to the highest feasible degree possible, and not fixed after tests are conducted on fully developed software.

How Does ASDM Work?

Working with ASDM begins with an assessment of whether a new feature or application poses a security risk. A risk assessment is followed by threat modeling and testing during which the use cases, threats, and countermeasures are determined. The code is reviewed and analyzed, while verification is done to promote cybersecurity. By adopting the Axis Security Development Model, Axis wants to integrate security into software development to effectively reduce security risks.

Axis conducts regular penetration tests, or simulated cyberattacks, on its software with the help of third-party companies. These tests offer an unbiased review of the company’s software and aid in enhancing its overall security efforts. Next, the Axis Software Security Group uses the results of the tests to evaluate the progress made through its Security Development Model (ASDM) and determine areas for improvement.

The Axis Product Security Team also takes into consideration any newly discovered vulnerabilities reported by external security researchers to enhance their products and way of working. It’s crucial to note that the Axis Security Development Model is an ongoing process, continuously evolving and improving.

One of the more significant aspects of the Axis Security Development Model is that it is a team-centric approach. The development teams responsible for creating the software are also accountable for its security. More than 1100 developers across 50 development teams use ASDM in their daily work. The Axis Software Security Group (SSG) provides training and the security toolbox, while also following up with the various teams to improve ASDM where necessary.

Moreover, the SSG satellites help fine-tune ASDM to each team’s unique needs since there are various technology stacks and operational practices. The software team managers and directors are responsible for overseeing their team’s ASDM work and ensuring the software’s overall security.

Why Was ASDM Launched?

Axis Communications developed the Axis Security Development Model (ASDM) in 2015, and it was made mandatory for all software development teams at the company to follow in 2017. Before its implementation, each development team had its own best practices for software development that were influenced by Axis’ culture of ownership, engineering achievements, transparency, and peer review. Although the teams produced high-quality code, there was no common approach to incorporating security considerations into the development process. Furthermore, the increasing importance of cybersecurity and the development of best practices created a need for better ways of working.

To establish a common and effective approach to cybersecurity, Axis evaluated existing cybersecurity standards and frameworks, such as ISO 27001, IEC 62443, NIST, BSIMM, and CMMC, that directly or indirectly address security in development. The standards and frameworks highlight the importance of integrating security into different stages of the development process and provide guidelines for best practices, as well as a common vocabulary for communication around cybersecurity.

However, ASDM is not simply a one-size-fits-all implementation of an existing standard or framework. Instead, it incorporates useful elements from various standards and frameworks and is customized to align with Axis’ company culture and development practices. This tailored model ensures its relevance for different types of software and its ability to accommodate new best practices as cyber threats and countermeasures continue to evolve. Finally, ASDM enables Axis software development teams to integrate security into their software and achieve the most significant impact possible.