Home Security Services Archive by category Cyber Security (Page 3)

Cyber Security

Primion Is Moving Forward with Determination: 30 Years of Success

In 2025, Primion Technology GmbH marks its 30th anniversary. Founded in 1995 as a medium-sized system integrator, Primion has continuously evolved: from classic Access Control and Time Recording systems to modular, networked platforms for Converged Security and Workforce Management Solutions, focusing on modern requirements such as Operational Technology (OT), the Internet of Things (IoT) and Cyber Security. The goal: scalable, reliable and future-proof systems with a clear focus on practical implementation and customer needs.

A new look for the next chapter

On its 30th anniversary, Primion is introducing a new corporate design including a redesigned, contemporary and fresh logo. The new brand appearance underlines what Primion stands for: technological progress, customer proximity and strategic foresight.

Our vision is to be a modern, high-performing, and trusted global solution provider for large and midsize companies around the world. Efficiency and increase of productivity are the core benefits we deliver to our customers through our products, services, and solutions. Ease of use is one of our key principles. Our new corporate identity brings this and other core values together, reflected in our claim: “Protect what matters!”.

Primion presented its new design and logo for the first time at the Security Expo in Munich at the end of June.

Technology for demanding applications

Primion systems are used in security-critical environments such as industry, research, transport, healthcare, public administration and even in the private luxury segment. Primion develops both software and hardware entirely in-house and offers highly integrated solutions that adapt to a wide range of requirements. App. Four thousand customers worldwide – from midsize businesses to global corporations – rely on Primion for safety, organization, and efficient processes to protect people and assets.

European presence with local strength

Today, Primion employs around 470 people at 20 locations in Germany, Austria, France, Spain, Belgium and the Netherlands. In addition, the security specialist maintains a global network of certified system partners around the world. The company remains close to the market: with regional expertise, technical depth and in-depth knowledge of national and international standards and customer needs. As part of the listed Azkoyen Group, Primion benefits from stability and growth opportunities.

Three decades after its founding, Primion is more ready than ever for what lies ahead: with a clear strategic focus, high-performing teams and the ambition to actively shape the security solutions of tomorrow.

Axis: Device management and cybersecurity through the lifecycle

A common misconception is that once a network device is installed, it requires minimal maintenance. However, this ‘set-and-forget’ approach can leave devices vulnerable to emerging cybersecurity threats and exploits. In reality, device management is critical throughout the entire product lifecycle – from initial setup to decommissioning. This article highlights essential cybersecurity measures and demonstrates how Axis device management software helps mitigate risks at every stage.

Implementation 

The foundation of a secure and efficient system is laid during the implementation phase, where careful planning and execution can make all the difference. During this critical stage, involving configuration and staging, installation, deployment and onboarding, there are important measures to take before handing the system over to the customer.

Upgrading the device to the latest recommended device software version is a critical step. When implementing a device, it’s essential to check that the latest software version is installed, considering that updates may have occurred during the time elapsed between device production and implementation.

Using up-to-date device software ensures inclusion of the most recently identified bug fixes. Crucially, it helps maintain cybersecurity by addressing vulnerabilities through the latest patches.  As cybersecurity is a constantly moving target, applying the latest device software version helps ensure a stable and secure system.

While device software updates can be done manually through the device’s web interface, using device management software gives you more control over these critical installation and security tasks. AXIS Device Manager, for instance, lets you efficiently update device software in bulk, set network parameters, deploy certificates, and configure other essential settings. By leveraging AXIS Device Manager, you can save time and effort in implementing and securing your devices, while also ensuring they remain up-to-date and compliant with the latest security standards.

In addition to updating device software, recommendations on security policies and advice on deployment can be found in the AXIS OS hardening guide. To further enhance security, AXIS Device Manager Extend allows you to set recommended security policies, such as making sure file transfer protocol (FTP) and secure shell (SSH) protocol are always closed. This ensures that parameters are constantly maintained with the most up-to-date security compliance. Even if the settings are changed in error, the management software can revert to the set policy.

You can also use AXIS Device Manager Extend to apply application policies, such as making sure that AXIS Video Motion Detection is always running the most up-to-date version on selected cameras. AXIS Device Manager Extend will also allow users to install and directly configure most applications on Axis devices.

In service 

Keeping track of a large number of devices during their lifetime on the network can be very time-consuming. In addition to inventory management and understanding the status of each device, key requirements include monitoring, maintenance, and upgrades across the system. An efficient and convenient way to monitor and perform maintenance is to use AXIS Device Manager Extend as a complement to AXIS Device Manager.

AXIS Device Manager Extend provides a centralized dashboard that allows efficient inventory and asset management, ideal for multisite operations. With remote access, crucial maintenance tasks can be scaled, such as upgrading the operating system, AXIS OS; defining, applying and enforcing security policies; and managing applications. It also helps speed up troubleshooting, allowing you to identify and resolve potential issues remotely, reducing the time and expense usually required for a site visit. The system administrator can use the software to instantly check the operational status of a device, its connection stability, and that all devices are operating as intended.

The management software can also indicate to the administrator the status of the device’s operating system and whether it is up to date. As cybersecurity threats evolve rapidly, making regular software updates is essential to ensure your devices are ready to face the latest cybersecurity threats. Via AXIS Device Manager Extend, device software upgrades can be pushed out to any connected device with just a few clicks to ensure it is running on up-to-date software.

Some organizations can be reluctant to upgrade in-service device software due to concerns that upgrades can affect system stability. Axis device management software provides two options to keep AXIS OS up to date: the active track and the long-term support (LTS) track. In the active track, AXIS OS is continually updated with new features and security patches. Alternatively, organizations with concerns regarding upgrades have the flexibility to use AXIS OS on the LTS track, which provides security fixes and patches without adding any new functionality. Axis device management software gives recommendations of AXIS OS on the LTS and active tracks to help you make the best decision for your upgrade according to your needs.  Axis devices are typically supported for an additional five years; that is, patches are available 5 years after the product has been discontinued.

In large systems, there’s the potential for high numbers of inactive, redundant accounts, such as temporary usernames set up for one-time service purposes. These unused accounts enable entry points and pose a potential security risk. The dashboard in AXIS Device Manager Extend presents an aggregated view of all user accounts and from here, the administrator can quickly manage them, removing them if necessary.

Decommissioning 

Decommissioning devices in a timely manner is crucial to maintaining cybersecurity and minimizing risks. Devices that are out of software support can pose significant threats, as they no longer receive updates and patches. To mitigate this risk, it’s essential to plan for device replacement before they reach the end-of-support date.

AXIS Device Manager Extend helps you stay on top of device lifecycle management by providing warranty, product discontinuation, and end-of-support information for all devices in the system. You can also track the end-of-support date for each device’s operating system, enabling you to prepare for decommissioning and replacement in advance. Plus, you can easily export inventory reports for auditing and compliance purposes.

When decommissioning an Axis device, it’s vital to remove sensitive data and perform a factory default to erase all configurations and data. While this can be done physically using the factory reset button, or the camera web interface, utilizing AXIS Device Manager provides a more efficient and streamlined process.

Mitigate risks and maintain cybersecurity throughout the device lifecycle 

Ensuring cybersecurity is vital throughout the lifecycle of network devices. Axis device management software increases the speed and efficiency of configuration, management, and maintenance of devices over time. Ultimately, they enable the implementation of robust safeguards to effectively mitigate the risk of cyberthreats.

2024 Tech Trends Maturity and Suitability Index

Welcome to asmag.com’s 2024 technology survey sponsored by ZKTeco. This year our survey saw participation by 250 security players who were polled not only on the suitability and maturity of security technologies but also on customer interest/enthusiasm over these technologies and their growth prospects in the near term. It is our hope that with the survey, readers will gain a better understanding of technologies that deeply shape our industry. The full results for video surveillance and access control can be found here.

Cloud/hybrid architecture

Video surveillance as a service (VSaaS) and access control as a service (ACaaS), which are increasingly adopted by security players, show little change in terms of suitability and maturity this year as compared to 2023, even though ACaaS ranks No. 1 for access control technologies with huge growth potential (full results can be found in the access control and video surveillance articles).

It’s worth noting that the hybrid architecture has received higher scores of 4.03 on suitability and 3.7 on maturity. In terms of customer inquiry and growth potential, hybrid ranks No. 4 and No. 3, respectively. Based on the results, we can see that the cloud momentum is still there, and this is especially the case for hybrid cloud, which distributes processing/storage between on-prem and cloud.

“Hybrid architecture is gaining popularity because it combines the best of both on-premise and cloud-based systems. It allows organizations to retain local control of their most sensitive data while leveraging the scalability and convenience of the cloud for broader management. This dual capability is especially useful for companies with legacy systems that aren’t ready for full cloud migration,” said Tom Buckley, Co-Founder of Qumulex.

“A flexible hybrid-cloud deployment provides multiple options, ensuring that regardless of how many systems are running on local servers or connected to the cloud, they can all be brought back to a central head-end for seamless management from a single platform. A hybrid approach also simplifies the transition to cloud-connected systems at a manageable pace, enabling edge devices to become cloud-compatible, adding cloud services to existing infrastructure, and allowing for the development of a long-term strategy that maximizes ROI while avoiding expensive forklift upgrades,” said Laurent Villeneuve, Senior Product Marketing Manager at Genetec.

AI/Generative AI

Generative AI refers to artificial intelligence that can create new contents based on existing datasets. A potential game-changer for security, generative AI garnered a suitability score of 4.16 and ranks No. 1 in both customer inquiries and growth potential over the next five years.

“Generative AI is gaining a lot of attention in security because of its ability to improve the accuracy and speed of threat detection, as well as its potential to reduce false alarms. By learning from vast amounts of data, generative AI can identify patterns that humans or traditional systems might miss, enabling more proactive security measures. It can also be used to enhance facial recognition, predictive maintenance, and video analytics. While it’s still maturing as a security technology, its rapid development and widespread applicability make it a top candidate for investment and adoption in the near future. As it matures, we expect to see more innovative applications that will revolutionize how we approach physical and cybersecurity,” Buckley said.

Meanwhile, Villeneuve argues that GenAI can also introduce new risks, which must be properly addressed.

“The rise of GenAI also introduces new security threats, including the proliferation of deep fakes and vulnerabilities in foundation models, which are trained on vast amounts of publicly available internet data. These models are increasingly becoming targets for adversarial attacks, such as efforts to introduce malicious data into the models’ training datasets. The security industry, in particular, must be vigilant in identifying and mitigating these emerging risks to ensure the integrity and safety of its systems. If implemented correctly, this can lead to faster response times and more efficient investigations, ultimately improving overall operational effectiveness,” he said.

Edge processing

In terms of edge processing, it gained a suitability score of 4.3 and maturity score of 3.86. In terms of customer inquiries, it ranks third. The high suitability score reveals that users enjoy the benefits offered by edge processing, where data is processed on the edge – only metadata is transmitted to the backend for further processing. This allows for better utilization of bandwidth and quicker response to incidents. The increasing availability of AI cameras where video can be processed on the edge also helps drive this trend.

Cybersecurity

Cybersecurity received suitability and maturity scores of 4.39 and 3.91, respectively. It also ranks No. 2 in both customer inquiries and future growth potential. The results reflect the growing importance of cybersecurity amid high attack rates. According to Broadcom, connected cameras accounted for 15 percent of all IoT attacks. A US News and World Report survey further shows 13 percent of respondents have experienced camera hacks, while 49 percent are worried about them. This has prompted vendors to design their products with cybersecurity in mind. Gallagher, for example, has launched their Controller 7000 with enhanced hardware and security infrastructure to optimize cybersecurity. Video surveillance equipment manufacturers are increasingly highlighting NDAA compliance where no key parts of components are made in China. With hacking and security breaches becoming more rampant, discussions and awareness over cybersecurity are all but likely to continue.

Unmanned security (drones and robots)

As for unmanned security such as drones and robots, it scored moderate suitability and maturity scores of 3.7 and 3.34, while ranking fourth in terms of growth potential in the near term. Unmanned security has been a much-discussed topic a few years back, yet user interest and enthusiasm seem to have diminished a bit. However unmanned security still has useful applications, especially in critical mission scenarios where monitoring by fixed cameras is insufficient. Mitsubishi, for example, has teamed up with 3S to offer a fire-prevention solution where drones are flying with both visible and thermal cameras, the latter of which can detect small fire points, which can escalate into larger-scale fires.

Tables:

Ranking of security technologies, by inquiries from customers

Ranking Technology
1 AI/Generative AI
2 Cybersecurity/cyber-defense solutions
3 Edge processing/storage
4 Hybrid cloud architecture
5 Unmanned security platforms
6 5G
7 Radar and lidar

Ranking of security technologies, by future growth potential

Ranking Technology
1 AI/Generative AI
2 Cybersecurity/cyber-defense solutions
3 Hybrid cloud architecture
4 Unmanned security platforms
5 5G
6 Edge processing/storage
7 Radar and lidar

6 key technology trends affecting the security sector in 2025

We’ve once again reached the time of year when we look ahead to some of the technology trends that will affect the security sector over the coming 12 months. The pace of change is as fast as ever.

Written by:
Johan Paulsson, CTO, Axis Communications
Mats Thulin, Director Core Technologies, Axis Communications
Thomas Ekdahl, Engineering Manager, Axis Communications

Some of the trends are evolutions of those we’ve seen in previous years. An obvious one is the continued interest in how AI will be applied in our sector, and we’ve highlighted some of the new considerations that will need to be addressed moving forwards. Others are new, or even a resurgence of topics we may not have focused on for a while.

National and regional legislators will once again try to keep pace with technological innovation. AI, cybersecurity, privacy, the need for resilience in critical entities… All these (and more) will be the focus of proposed and new regulation. We haven’t highlighted this as a specific trend, but it’s no less a priority and something every organization will need to respond to.

We believe that within all of these trends lies significant opportunity for the sector. For our customers that means enhanced capabilities, more flexibility, greater efficiency and increased value.

Hybrid solutions: the foundation for freedom of choice

In previous years we’ve highlighted how hybrid architectures – those making best use of edge, cloud, and on-premise technologies – have become the de facto choice for security solutions.

The drivers for the choice of architecture will be unique to every organization, taking into account technological, legal, ethical and governance concerns and requirements. The environment is evolving quickly, and therefore freedom of choice is imperative.

Hybrid solutions give freedom of choice in how to store, view, and analyze video, or manage devices. A combination of edge, cloud, and on-premise technologies can deliver an optimal total system solution, or its flexibility used to choose the specific instance preferred.

Whether demanded by emerging local and regional regulations or concerns over control of data, cost, or energy efficiency, hybrid solutions will continue to offer the greatest flexibility in creating architectures to best suit specific organizational needs and allow a system to be scaled.

AI evolution alongside AI efficiency

Development within the field of AI continues to race ahead. Deep learning technologies are the bread and butter of most analytics solutions within the security sector, while newer generative AI technologies are rapidly maturing. There is still a lot of hype in certain areas but real applications of generative AI in the security sector are becoming available. Each step of evolution brings with it a new set of opportunities, but also ethical, legal, and corporate considerations.

Generative AI models are large and require much compute capacity to execute, which creates a debate in how to balance the cost of AI (both in terms of financial investment, but also in terms of energy use and environmental impact) with its value. A lot of effort is being put into reducing the size of the models while maintaining the quality of results. The increased use of AI technologies only reinforces hybrid architectures as the standard.

The various ‘flavors’ of AI – from deep learning-based object recognition to generative AI – either demand or benefit from being applied at different places in the value chain, and in specific environments. Generative AI can assist operators in interacting with security solutions in natural language but, for the foreseeable future at least, require significant processing power. Conversely, deep learning-based analytics such as enhanced object recognition can be performed within surveillance cameras themselves.

Eventually this will enable generative models to be, at least partly, run on cameras with high-quality results. At the same time the models are improving in quality with regards to ethical aspects, bias, hallucinations, and the risk of making the wrong decisions.

Over time there is a big opportunity to dramatically change the efficiency and effectiveness of security operations. Algorithms will be able to understand what is happening in a scene and react to anomalies, based on the analysis on different types of input data, including but not limited to visual information. Input data will come from radar, audio, and numerous other sensors. This will create solutions that enable increasingly proactive capabilities and generate valuable insights in security scenarios for long term planning.

Beyond safety and security becomes real

The application of increasingly advanced computer vision, audio, access control and other connected technologies continues to serve security and safety use cases. Greater accuracy of analytics through the application of AI – particularly in object recognition – means that incidents can be responded to more quickly and effectively than ever before.

What is also clear is that the data generated by sensors of all types – video, audio, environmental, and more – can benefit numerous use case beyond the traditional. While still a relatively small part of the market, we expect to see an acceleration of applications aligned to operational efficiency and business intelligence.

This trend highlights the opportunities for increased collaboration across customer organizations. Technology being sourced or specified for one use case could well be used in another area of a business’s operations. For instance, data being created by video cameras employed principally for security purposes can be analyzed over time to improve customer or employee experience, sustainability, or process efficiency.

Through the high-quality hardware platforms available, the pace of development and innovation is astounding. Hardware vendors that foster an open and collaborative ecosystem of application developers and system integrators will bring greatest value to customers most quickly.

The “rebirth” of image quality

It may be counterintuitive to suggest that a focus on image quality is a trend in the sector, where many would assume it’s always been a priority (which, of course, it has). The trend is in how the images from visual sensors are being used, and with that the increased opportunities that better image quality brings.

The paradigm shifts when we consider that images are now often being initially viewed and analyzed by computers rather than humans, and that images are being viewed continuously, rather than when an incident of interest has taken place.

Advances in analytics and AI mean that a higher resolution image will inevitably lead to a better result, whatever the use case. Object recognition will be more accurate and more detailed data (and metadata) created. The drive towards even better image quality has been reignited.

With this has come opportunities for efficiency as well as effectiveness. A single camera producing much higher image quality can cover as large an area as multiple cameras would have been needed for previously. Higher resolution images also support analytics, for instance in large crowds, busy traffic intersections, or fast-moving production lines.

The human is still very much “in the loop”, as the saying goes. Operators will be automatically alerted to scenes they need to pay attention to, increasing efficiency and effectiveness of a response. Image quality as a focus will also place keen attention on the maintenance of surveillance cameras – still often a manual task – as small obstructions can have a significant impact on analysis.

The long-term value in products comes through software support

At the higher end of the security sector, the quality of hardware has been improving year-on-year. Today, hardware devices can be of such high-quality – particularly in terms of performance and capabilities – that expectations about their lifetime are greater than ever.

But while quality hardware can last for many years – as illustrated by the length of warranties – the defining factor in a camera’s functionality, including cybersecurity, and therefore its lifetime value, comes through ongoing software support.

Vendor commitments to support software throughout the expected lifetime of the hardware are essential; software that continues to enhance and build on the capabilities of the camera and keep it as secure as possible.

This also underpins the total cost of ownership of hardware. An investment in better quality camera, with comprehensive software support throughout its lifecycle, will ultimately be a more effective and efficient solution.

Technology autonomy to the customer’s benefit

Our role, and that of our partner ecosystem, is ultimately to focus on meeting the needs of customers. Technology for technology’s sake serves nobody’s purpose – innovations must be aligned to the priorities of the end user.

This clearly means supporting customers’ goals in safety and security, operational efficiency, and business intelligence. But it also means supporting their cybersecurity posture, commitment to sustainability through energy efficient solutions, and flexibility and freedom of choice via open standards-based technologies and platforms.

Technology vendors with more autonomy over their core technologies are clearly best placed to support these customer requirements. Greater control over foundational technology, from the silicon “upwards”, will allow a vendor to design specific capabilities and functionality aligned to customer needs into its products. Such an approach to core technology ownership will also allow a vendor to stand by commitments of being “secure by design”.

Furthermore, greater control of technology – at a component or even material level – is an important prerequisite to more effectively mitigate the risks of broader disruption to global supply chains. This enhances the ability to meet the requirements of customers, when they are needed.

We’re already seeing companies that would have traditionally been seen as software vendors designing their own semiconductors to gain more control over their service delivery – particularly in the area of AI – and we foresee this trend continuing in all sectors. Core technology independence is a trend we’re proud to say we’re some way ahead of, having developed our own system-on-chip, ARTPEC, for the last 25 years.

So, there you have it, our take on some of the trends that will shape the security sector in 2025. We’re sure you’ll have views on these and maybe some other trends of your own. We’d be delighted to continue the discussion on this with you.

Protecting Critical Infrastructure with Senstar’s Advanced Security Solutions

In an era where threats to critical infrastructure are increasingly diverse and complex, protecting essential facilities has become paramount for national security and operational resilience. Critical infrastructure includes the vital sectors that keep society functioning—such as energy, water, transportation, healthcare, and IT. Disruptions in these areas can have severe consequences, making effective critical infrastructure protection (CIP) essential.

Critical infrastructure comprises both physical assets and digital systems that support essential services. Given the growing threats from cyberattacks, physical intrusions, insider threats, and natural disasters, CIP requires a comprehensive approach combining physical and cybersecurity measures. Effective CIP involves risk assessments, regulatory compliance, security technologies, and rapid incident response, all designed to protect infrastructure from disruptions and ensure continuity.

The Evolving Threat Landscape

Today’s critical infrastructure faces several primary threats:

  • Cyber Threats: Increasingly digitized infrastructure is vulnerable to cyberattacks, with hackers targeting industrial control systems (ICS) and SCADA networks. Successful attacks can disrupt essential services, cause financial losses, and jeopardize data security.
  • Physical Intrusion: Facilities like power plants, substations, and data centers are susceptible to physical breaches. Given their often remote locations, traditional security alone may be insufficient to deter or detect intrusions.
  • Insider Threats: Individuals with authorized access, such as employees or contractors, can inadvertently or intentionally compromise security, making insider threat detection essential.
  • Environmental Risks: Natural disasters like hurricanes and earthquakes pose ongoing threats to infrastructure, especially as climate change increases the frequency and severity of these events.

Senstar’s Solutions for Critical Infrastructure Protection

Senstar has over 40 years of experience developing perimeter and physical security systems specifically tailored to the needs of critical infrastructure. Here’s how Senstar’s technology helps safeguard these vital assets.

  1. Perimeter Intrusion Detection Systems (PIDS)

Senstar’s perimeter intrusion detection systems, fence-mounted, buried or above ground, detect intrusions at the perimeter to prevent unauthorized access. Key benefits include:

  • Scalability: Systems can be tailored for small or large facilities.
  • Reliability: These solutions function effectively even in harsh environments, maintaining accuracy in extreme conditions.
  • Minimized False Alarms: Advanced algorithms filter out noise from environmental factors, ensuring accurate detection.
  1. Video Management Systems (VMS)

Senstar’s Symphony Common Operating Platform integrates video surveillance with other security measures to enhance monitoring capabilities:

  • Scalability: Senstar Symphony supports facilities of all sizes, from single sites to multi-location deployments.
  • Intelligent Analytics: AI-driven video analytics, which can detect suspicious behavior, loitering, or potential threats in real time.
  • Centralized Control: Provides security teams with a unified platform to manage multiple sites and respond rapidly to incidents.
  1. PSIM Integration

Senstar’s integration with Physical Security Information Management (PSIM) platforms enables centralized control and coordinated incident response. This provides real-time situational awareness, improving the facility’s ability to respond swiftly and effectively to potential threats.

  1. Cybersecurity for Physical Security Systems

Recognizing the importance of cybersecurity, Senstar embeds secure protocols, user authentication, and encryption in its systems to protect against unauthorized access and cyber threats.

Benefits

Senstar’s solutions offer critical infrastructure operators a comprehensive security system that provides:

  • Early Detection: Proactive identification of potential threats before they escalate.
  • Cost Efficiency: Integrated systems reduce operational costs and improve security effectiveness.
  • Scalability: Modular systems are adaptable for both small and large infrastructure setups.

As threats to critical infrastructure grow, Senstar’s advanced solutions offer essential layers of protection. Senstar supports robust, resilient, and scalable CIP strategies that help safeguard society’s most vital services. Investing in Senstar’s technology not only enhances security but builds infrastructure resilience, ensuring essential services remain uninterrupted.

NIS2: WinGuard Facilitates the Implementation of New European Cybersecurity Directive

The European Union has taken a significant step towards bolstering cybersecurity with the introduction of NIS2, the second version of the “Network and Information Security Directive.” This directive sets new standards for the security of networks and information systems in critical sectors, affecting EU member states and the Balkan countries.

The primary goal is to strengthen the resilience of networks and information systems and improve security standards across critical sectors. This includes establishing cybersecurity authorities and fostering collaboration among European countries and institutions. Companies, especially those in critical infrastructure sectors such as energy, transportation, health, and finance, are called upon to act. This involves implementing and enforcing security measures, reporting and documenting security incidents, collaborating with authorities, and implementing risk management procedures to identify and mitigate potential risks.

WinGuard can provide valuable support in this context by offering central security management functions, compliance tools, and automation options, thus enhancing the physical security of buildings as well as networks and information systems.

1. Integration of Security Systems: WinGuard aids companies in optimizing their existing security resources by integrating a wide array of existing IT and security solutions, such as access control, video surveillance, and intrusion detection systems. All integrated security systems and infrastructures are monitored and managed through a central platform, WinGuard. This enhances the monitoring and management of physical security measures, ensuring uniform and rapid identification and response to security incidents.

2. Incident Management: WinGuard facilitates the recording, prioritization, and handling of incidents, enabling more efficient responses to security incidents.

– Monitoring: Events and alarms from various systems can be monitored in real-time, forming the basis for early reactions to potential attacks.
– Automatic Alerting: When security incidents or anomalies are detected, the platform can automatically trigger alerts and notify the relevant personnel. This ensures swift responses to security incidents and the implementation of appropriate measures to maintain security.
– Automation and Orchestration: WinGuard’s ability to automate and orchestrate various security systems enables companies to implement and manage security measures more efficiently. Thus, Security responses are quicker and more coordinated.

3. Continuity Planning: WinGuard supports the creation and management of emergency and continuity plans, ensuring that critical business processes can be maintained even during physical security incidents which is crucial for the resilience of critical infrastructures.

4. Compliance and Reporting: Through automated reporting functions necessary information related to security-relevant incidents and measures are meticulously documented and analyzed. The generated compliance reports can be useful for internal audits and communication with supervisory authorities.

5. Risk Management: By integrating risk management tools, WinGuard helps companies identify, evaluate, assess, and mitigate potential risks and vulnerabilities on a regular basis.. This allows potential security gaps to be detected and addressed, minimizing risks before they lead to incidents.

6. Compliance Management: WinGuard enables companies to define and enforce security standards. This includes data encryption, secure password usage, and firewall implementation. The platform continuously monitors these security measures against current regulations and initiates immediate corrective actions in case of deviations.

7. Training and Emergency Drills: WinGuard can provide information and instructions via the platform to aid in awareness-building of employees. Additionally, it can simulate security incidents and conduct emergency drills to improve preparation for real threats.

For affected companies and managers, NIS2 presents both a challenge and an opportunity. They must ensure their IT infrastructures meet security standards and implement appropriate protective measures. The directive offers the chance to use cybersecurity as a competitive advantage and boost customer trust in data security.

Conclusion: NIS2 is a significant development for cybersecurity in Europe. Solutions like WinGuard play a crucial role in implementing these directives by helping companies effectively protect their networks and information systems. WinGuard raises security standards and enhances resilience against cyber-attacks. Through central integration and management of security systems, real-time monitoring, detailed documentation, and proactive risk management, WinGuard offers a robust solution for improving physical security and ensuring compliance with NIS2 requirements. This enables companies to meet NIS2’s demands and elevate their cybersecurity to a new level.

Milestone Systems Releases Insightful Thought Paper on Cybersecurity for Video Technology: Key Strategies to Combat Cyber Threats

Milestone Systems, a pioneer in data-driven video technology software, recently published a comprehensive thought paper addressing the critical need for robust cybersecurity measures in video technology solutions. The paper titled “Cybersecurity for video technology: Understanding and countering cyber threats” delves into the complexities of cybersecurity in video surveillance, offering invaluable insights and strategies to fortify organisations against cyber threats.

Cyber threats pose a significant risk to video technology solutions in today’s digital age, as evidenced by high-profile breaches. The thought paper underscores the urgency of prioritising cybersecurity and provides a roadmap for technology decision-makers to navigate this evolving landscape effectively.

The thought paper by Milestone Systems dives into crucial aspects of cybersecurity precautions, providing insights into essential concepts for companies to ensure robust protection against cyber threats.

Below are some key takeaways from the thought paper:

Understanding the Cyber Kill Chain:

Identifying the Cyber Kill Chain offers organisations a systematic approach to understanding and mitigating cyber threats. Breaking down attacks into seven stages makes it clear where proactive defences can be deployed to minimise the risk of breaches.

Protecting IP-Network Video Cameras:

The paper recognises vulnerabilities in IP-network video cameras and emphasises the importance of implementing strong security measures. Measures such as robust authentication protocols and regular firmware updates are vital in fortifying defences against potential risks.

Securing Video Management Software (VMS):

Highlighting the significance of securing Video Management Software (VMS), the paper advocates for proactive strategies like penetration testing and engaging ethical hackers. These measures bolster security and ensure resilience against potential threats.

Responsibility for Cybersecurity:

The paper distinguishes between the responsibilities of on-premises and cloud solutions and underscores the necessity of technical proficiency and transparent communication. By understanding their roles, organisations can effectively manage cybersecurity risks.

Openness and Transparency:

The paper stresses the importance of openness and transparency in addressing cybersecurity vulnerabilities. By openly acknowledging weaknesses, vendors empower customers to take proactive measures, foster collaboration, and enhance the overall cybersecurity posture.

Addressing the Human Factor:

Acknowledging the human element as a potential weak link in security, the paper emphasises the importance of education, training, and balancing security and usability. Prioritising human-centric security practices enhances overall cybersecurity resilience.

Download the full thought paper

Commenting on the release of the thought paper, Jos Beernink, VP of EMEA at Milestone Systems, stated, “In an era where cyber threats loom large, safeguarding your video technology against potential breaches is paramount. Our thought paper is a useful guide for organisations to navigate the complex cybersecurity landscape effectively. By implementing the strategies outlined in the paper, organisations can strengthen their defences and mitigate the risk of cyberattacks.”

LiDAR: How It Transforms Airport Security

Security is an important part of airport operations. More and more, LiDAR or light detection and ranging is used to boost airports’ security and efficiency. This article takes a closer look.

Source: William Pao

Needless to say, airports attach great importance to security, especially amid heightened security issues at airport facilities. According to Osprey Flight Solutions, from January to July 2022, the company issued five alerts reporting shootings at Dallas Love Field, Miami, San Francisco, Greenville-Spartanburg and Nashville airports, some of which resulted in disruption to airport operations. Osprey also issued three alerts highlighting stabbing incidents that have affected aviation workers and passengers in 2022 at San Francisco Airport and Boston Logan International Airport. To counter these issues, airports adopt advanced security systems such as video surveillance and access control.

Why is LiDAR good for an airport?

Increasingly, LiDAR is also used in airports to enhance security, operational efficiency as well as passenger experience. LiDAR works by way of shooting laser pulses into the environment; the pulses bounce off objects and return to the sensor, allowing the system to draw a highly detailed 3D map of the surroundings. More and more, it’s found its way into airports due to its various advantages.

“In 2023, several leading international airport groups initiated substantial LiDAR projects that will bring advanced people flow monitoring capabilities to tens of thousands of square meters in 2024,” said Raul Bravo, President and Founder of Outsight. “This technology is now recognized as the next generation for monitoring people flow, curbside, and parking areas. This shift to covering large zones, such as complete terminals or even entire airports, follows an initial phase where stereo-vision cameras were predominantly used in local and relatively small-sized areas to monitor touchpoints, like passport control zones.”

“The practical applications for 3D LiDAR solutions are game changers for enhanced airport physical security and business operations, and the ability to improve the traveller experience from the curb to the boarding gate. From a technological perspective, 3D LiDAR solutions can continuously track people in large and dense environments with extreme accuracy, seeing far beyond the limitations of conventional 2D video imaging and analytics,” said Enzo Signore, CEO of Quanergy Solutions.

Indeed, LiDAR offers certain advantages over other types of security systems, for example, video surveillance. In particular, privacy protection is a major benefit.

“Besides reliable detection of unauthorized intrusions with a low false alarm rate, data privacy is particularly important at airports. LiDAR captures data anonymously, ensuring the preservation of individuals’ privacy rights. With a larger field of view and more flexible mounting options, LiDARs are also more cost-effective than cameras because there is only a smaller amount needed to cover the desired area,” said Florian Petit, Co-Founder and Chief Experience Officer (CXO) of Blickfeld.

“LiDAR, when used with the right processing software, is increasingly preferred in airports due to its precision in tracking passengers’ journeys and its inherent anonymity. This technology does not capture any personal details, aligning with privacy laws like GDPR, and reducing legal and ethical concerns. This anonymity also increases LiDAR’s acceptability among passengers and staff, enhancing airport security and operational efficiency,” said Bravo. “Additionally, the industrialization of LiDAR technology has significantly reduced costs. Outsight uses RoboSense’s LiDAR in several airport applications. Because RoboSense is now able to mass-produce their LiDAR, these solutions have become more affordable than traditional camera or stereo-vision systems and deliver higher value.”

LiDAR airport application

Generally speaking, LiDAR has security and non-security applications at airports. Not only can they secure airports, but they can also enhance operational efficiency and the user experience. Below we take a closer look.

Security

According to Signore, in terms of security, a breach in the perimeter, even just one, can potentially bring airport operations to a standstill, leading to flight delays and compromising the safety of travellers and personnel. “The consequences may include significant financial repercussions for airports, encompassing substantial fines, damages, and the loss of millions of dollars in revenue,” he said. “3D LiDAR is a proven technology for superior perimeter intrusion detection applications. 3D LiDAR also provides a highly effective means of eliminating tailgating and piggybacking through security mantraps and revolving doors into secured areas, which is a prevalent security challenge in busy airport terminals.”

“Unauthorized access to critical areas, such as aircraft parking zones, must be promptly detected, triggering an immediate alarm for swift intervention by security personnel,” Petit said. “Simultaneously, the detection solution must only trigger an alarm for unauthorized human entry. Intrusion detection systems lacking 3D LiDAR data often fail in this regard, resulting in numerous false alarms, triggered for example by vegetation or animals.”

Operational efficiency

LiDAR can provide insights into occupancy and foot traffic at the airport. This, in turn, can help operators allocate resources more effectively.

“From an operational perspective, LiDAR facilitates the real-time, effective allocation of resources and staff management. Advanced software solutions, such as those offered by Outsight, introduce unique features like the automatic detection of overflowing queues. If not addressed promptly, such situations can lead to a diminished passenger experience,” Bravo said.

“A 3D LiDAR solution delivers new sources of data-driven intelligence on pedestrian and vehicular movements and density/occupancy, providing airport management with insights to better allocate personnel resources and processes. This includes everything from baggage handling to queue management for deliveries and food/retail areas, and personnel and traveller transportation services,” Signore said.

Improved user experience

This, then, can lead to a better user/traveller experience at the airport. “A 3D LiDAR provides the unparalleled ability to simultaneously track up to 600 individuals in crowded terminals, including check-in areas, security checkpoints, boarding gates, retail and dining areas, and baggage transport systems and claim areas. Here, the people and vehicle counting and tracking can assist with queue management to monitor and manage wait and dwell times to ensure smoother operations, which ultimately enhances the traveller experience,” Signore said.

How to Successfully Deploy a LiDAR System in Airports

As we mentioned earlier, LiDAR is increasingly used in airports for security and non-security purposes. But how can a LiDAR system be set up right? This article takes a closer look.

LiDAR has increasingly found its way into airports. LiDAR stands for light detection and ranging and works by way of shooting laser beams into the environment and analyzing the beams that return. More and more, it’s used by airports as a viable solution not just for security, but for operational efficiency as well.

“To avoid lengthy waiting times at the security checkpoints, passenger volumes and movements in the check-in hall can be detected and analyzed. LiDAR-based people counting technology allows the staffing of the security checkpoints lanes to be adapted to the actual passenger traffic,” said Florian Petit, Co-Founder and Chief Experience Officer of Blickfeld.

Advantages over video surveillance

Indeed, LiDAR offers certain benefits to airport operators, compared to conventional security systems such as video surveillance. “3D LiDAR sensors can cover a very large area compared to traditional cameras by an order of magnitude. Coupled with its hyper-accuracy, 3D LiDAR provides a significant total cost of ownership (TCO) advantage, which becomes even greater when considering the cost of infrastructure, cabling, and deployment. In short, you only need a few LiDAR sensors to cover the same area that would otherwise require several cameras to monitor,” said Enzo Signore, CEO of Quanergy Solutions.

Raul Bravo, President and Founder of Outsight, agrees.

“While LiDAR technology used to be quite expensive and more on the prototype level, it’s now much more accessible both in terms of cost and performance,” he said. “The value you get from (Outsight partner) RoboSense LiDAR these days is impressive. Thanks to the company’s technological progress and increased production, it’s become a more affordable option compared to regular camera systems. What adds to its cost-effectiveness is using fewer units per square meter, cutting down on everything from hardware costs to installation, wiring, networking, and ongoing maintenance.”

Bravo adds that the cost saved from false alarms reduction achieved by LiDAR can also be significant. “LiDAR’s advanced features significantly mitigate the issue of false alarms, a major concern in security operations, where false alarm rates can reach as high as 97 per cent, leading to alarm fatigue and potential security lapses. In 2022, these false alarms cost an estimated US$1.8 billion in wasted resources. LiDAR, especially when paired with sophisticated software, marks a significant advancement in this area,” he said.

Working in conjunction with cameras

Yet this doesn’t mean LiDAR can’t work in conjunction with cameras in airports. In fact, both technologies can complement each other quite well.

“3D LiDAR can easily become the ‘third eye’ of any security camera system. 3D LiDAR sensors provide object geolocation with pinpoint accuracy to the PTZ cameras to enable a ‘slew to cue’ workflow so the cameras never lose sight of the people/objects identified for tracking,” Signore said.

“In many scenarios, after the detection of unauthorized intrusions with LiDAR technology, cameras are employed for verification, which can also be beneficial in airports. However, careful attention must be paid to protecting individuals’ privacy rights in this process,” Petit said. “The high resolution of the data provided by the Blickfeld Security solution can in certain cases eliminate the need for cameras for verification and distinguish people anonymously from other objects.”

Deploying a LiDAR system in airports

As with other types of security solutions, deploying a LiDAR system in airports requires careful planning and a thorough understanding of the airport environment.

“3D LiDAR deployment at commercial airports needs to be strategically planned and deployed just like a security camera-based solution to ensure that the desired wide area coverage is obtained,” Signore said.

“The optimal installation depends on the specific local conditions. Typically, an installation on the hall ceiling or other elevated areas is recommended, allowing the sensors to have a comprehensive view and minimizing the number of devices required. With Blickfeld’s Qb2 LiDAR solution, installation and operation are notably straightforward. This is due to the software on the device requiring less cabling, and the possibility of WLAN transmission of the data,” Petit said.

According to Bravo, successfully deploying a LiDAR solution hinges on three critical aspects: engaging with LiDAR technology experts, ensuring distinct expertise in hardware and software, and utilizing advanced 3D simulation software.

“The complex nature of LiDAR technology necessitates collaboration with seasoned professionals. This specialized technology requires expertise that many companies, traditionally offering old-fashioned solutions like Wifi tracking or Stereo-vision, may not possess,” he said.

Bravo added: “It’s essential that hardware and software components are provided by expert entities, keeping full inter-operability. Crafting LiDAR software is a complex task, more challenging than traditional computer vision software for cameras, and requires its own set of specialized skills, distinct from hardware design and manufacturing. For planning, advanced tools like Outsight’s 3D LiDAR Simulator are indispensable in optimizing sensor setup, a crucial step in deployment. Utilized in over 2000 projects, this tool is both a pioneer and leader in its field.”

The new firewall from DoorBird: Effective protection for your building network

The new DoorBird A1051 Internet Firewall is now available worldwide. DoorBird is the first in the industry to launch a user-friendly solution that provides additional protection for the network of door communication systems.

The easy-to-install firewall increases security for all networks where DoorBird products are used – both inside and outside. The Berlin-based manufacturer Bird Home Automation GmbH creates another unique selling point in the field of smart IP video communication with the DoorBird A1051 Internet Firewall product. The firewall reliably stops unauthorized network traffic without the need for complicated configurations. The product is pre-configured at the factory and ready for immediate use. The installation takes place between the local Internet router and the DoorBird IP video door communication network – easily and without any prior technical knowledge. The network is protected against unauthorized access at main and side entrances, underground garage entrances, floor accesses` or other rental areas indoors. This makes the Internet firewall suitable for large office complexes, commercial buildings, apartment buildings, and single-family residences. For example, a tenant could misuse the network cable connected to an IP video indoor station to surf the Internet or gain unauthorized access to other network components in the building. Implementing firewall solutions for this purpose with well-known firewall products is expensive, complicated and most of all very time-consuming to implement on a day-to-day basis. Part of ASSA ABLOY 2 In order to meet individual network requirements, smart home systems from third-party providers (e.g. DoorBird Connect partners) can be whitelisted. The Internet Firewall can be configured comfortably remotely via app or browser.