Opinions on technology updates in the second half of 2022 … – SourceSecurity.com

Dahua DH-SD6C3425XB-HNR-A-PV1 4MP 25x Starlight IR WizSense Network PTZ Camera
Doorking ProxPlus™ Secure Card Readers
The ME8 Series IP Cameras from March Networks
Climax launches products that adopt SF1 Technology
Milestone provides XProtect video management software to enhance security for Massachusetts General Hospital
How intelligent cameras enhance safety in nursing homes
Finnish retail co-operative uses March Networks video surveillance in more than 70 locations
Dahua sets up customised digital solution to efficiently manage Anta Group's 12000+ stores
Anatomy of a false alarm
Making physical security a critical pillar of your cybersecurity strategy
Preventing Fan Violence: 7 Tips for Moving from Reactive to Proactive Security
Improving real-time visualisation and collaboration in SCADA Operations
5 question check-up: Test your camera's cybersecurity
IoT connectivity
2023 trends in video surveillance
5 must-haves for seamless VMS connectivity
15 Jul 2022
Six months can go by in the blink of an eye. In 2022, it almost seems as if it has. Here we are already at mid-year after what has been an eventful six months for the security marketplace. There is still a lot ahead in 2022 for the industry, and our Expert Panel Roundtable has been considering what the coming months might hold in terms of technology change. We asked this week’s panelists: What will likely be the most important technology development in the security marketplace in the second half of 2022?
In an increasingly connected world, physical security is a major concern for American companies as a heightened threat environment prevails, spurred by geopolitical, economic and extremism. Businesses are facing more risks than ever before with security professionals receiving new information daily from Open Source Intelligence, social media, the Dark Web, weather feeds, technology systems, real-time news, HR systems, public event notifications and more. It’s crucial for businesses to have technology that enables them to detect, investigate and assess risks before they occur. In the second half of 2022, the most important development in the security marketplace will be a focus on actionability. Being able to keep track of changing situations in real-time and make quick decisions is the difference between simply knowing a threat is there and proactively acting on it. It’ll be imperative for organisations to mitigate threats proactively to preserve business continuity and build long-term organisational resilience.
Further advancement of artificial intelligence (AI) solutions will be the most important technology development in the second half of this year. Given the economic downturn happening right now, companies across the board are looking to save costs. Security guard expenses form the biggest line item in any corporate security budget, and security leaders will be looking to reduce that spend. This will naturally result in increased adoption of AI solutions such as automatic monitoring of access control alarms (door forced open, door held open, etc.), tailgating and piggybacking detection, and other analytics.
This is a timely question because 2022 is a turning point in the video surveillance industry. Users will be able to search for specific video the same way they search the web, replacing the need to scrub through hours of video in a storage closet. Cloud-based artificial intelligence is powering this new technology, and we expect to see significant investment across the industry. Similar to the evolution of the internet, the future standard for video surveillance will be a Google-like search platform that is easy to use and accessible to all.
Generally, new security technology takes a while to mature and capture the attention of the market, so current trends (such as the use of Bluetooth security credentials via a smartphone) are likely to be at the forefront of demand during the second half of the year as well. Looking further ahead, IoT devices are having a big influence on security systems and how they are used, so expect to see more use of smart sensors that feed data back to the integrated security and IT network. As we have seen in the security industry already, greater integration puts more pressure on providers to use standardised platforms, so we are likely to see lots of conversations between security providers about shared protocols and networks. The other consideration with security and other IoT systems sharing a network will be the strain this puts on network bandwidth and resources.
It’s tough to say any one technology will receive the notoriety of ‘most important,’ but there will certainly be key themes in the marketplace that are poised to play a large role in shaping the future of security technology. One will be the integration of Artificial Intelligence (AI) and analytics into every aspect of video surveillance and security technology to optimise and enhance all aspects of performance. Advancements in AI video analytics will further enable new use cases – beyond traditional security use cases – as the technology evolves across industries. Alongside this, it will also be important for the marketplace to focus on integrated solutions, such as access control and audio that communicates with surveillance technologies, to further provide comprehensive and robust security offerings that span business operation imperatives.
In my world it’s all about entryway security. Through that lens I see major developments in AI, drone uses, auto-locking technologies and immediate deployment of countermeasures. There’s also a movement to decrease the number of entryways along with an increased adoption of access control that includes prevention of prohibited items such as guns with a weapon screening program and known prohibited people. Technology that will safeguard your entryway will continue to be key and will require increased training and retraining along with major efforts to reduce workplace violence.
Touchless biometric technology will take big steps, especially facial recognition. The pandemic has been changing a lot worldwide, including the physical security industry, especially the booming demand for contactless biometric systems that prevent virus spread, lower infection risk, and eliminate unauthenticated access. Face recognition will be among the most widely implemented and accepted biometric solutions. According to a report of Mordor Intelligence, the global biometrics market was valued at USD 12.97 billion in 2022 and is projected to be worth USD 23.85 billion by 2026, registering a CAGR ([Compound Annual Growth Rate]) of 16.17%. According to Global Industry Analysts, the global facial recognition market will be valued at USD 15 billion, registering a CAGR of 18.2%. Face recognition brings users a safer environment, more efficiency, and less risk of physical contact with the biometric data protected. It will be in the pioneer position of biometric industry development in the second half of 2022.
For the second half of 2022, I see three areas of development, each driven by the need to provide customers with an easier way to cover more of their environment, without requiring more operators, and continue to support a remote workforce. The first is that analytics availability and reliability have increased over the years and are now integrating with platforms such as video management systems (VMS). Customers are looking to use best-of-breed analytics in their deployments to help monitor situations around operational efficiency and life safety without having to replace their VMS platform. The second is the drive to provide reliable and secure remote access and management for systems. The cloud is one way to achieve remote access and management, but it does not have to be the only way. The third area of development is with system density. Camera resolutions continue to increase, and customers want to use the highest frame rate of cameras to get the most out of their video systems.
In the second half of the year, it is likely that more firms will require services that enable the use of video analytics to extract operational value from visual data, while using AI-powered tools to protect privacy. Both public and private organisations are turning more towards video analytics as they can be useful in many different contexts. They can help in saving time for CCTV camera operators, help efficiency in monitoring places for crime, and can be integrated into other systems – i.e., counting footfall at different locations – as well as use for smart parking, automatic licence plate recognition, and facial recognition. 2022 will also bring further growth in consumers investing in personal video surveillance for their homes. With the pandemic having forced many to stay at home, home security has become more of a priority. Ring, which produces doorbell cameras, is increasingly popular: They are now the largest corporate-owned civilian-installed surveillance network in the U.S.
Will the remainder of 2022 be a turning point for video surveillance? Will the next six months see the integration of AI and analytics into every aspect of video and security? Will we see big steps for touchless biometrics? These are just a few of the technologies our Expert Panel Roundtable mentions as likely to be dominant forces in the second half of the year. The observations of our panel suggest a need for continuing vigilance as security professionals strive to stay abreast of the latest fast-moving developments in technology.
The only guarantee: Data growth – can your infrastructure keep up?
Top 10 articles of 2022 reflect the cutting edge of security technology
Getting to know Chris Bone, CTO at ASSA ABLOY Group
Nexperia, the pioneer in essential semiconductors, has introduced the PMCB60XN and PMCB60XNE 30V N-channel small-signal trench MOSFETs, with RDS(on) in the ultra-compact wafer-level DSN1006 package, to make energy go further where space is tight and battery runtime is critical. Minimise energy losses and increase efficiency Ideal for highly miniaturised electronics like smartphones, smart watches, hearing aids, and earphones, the new MOSFETs support the trend toward greater intelligence and richer functionality that raise system power demand. With RDS(on) up to 25% better than competing devices, they minimise energy losses and increase efficiency in load switching and battery management. Their superior performance also reduces self-heating thereby enhancing user comfort in wearable devices. Lower resistance  PMCB60XN and PMCB60XNE have maximum RDS(on) of 50mΩ and 55mΩ respectively Specifically, the PMCB60XN and PMCB60XNE have maximum RDS(on) of 50mΩ and 55mΩ respectively, at VGS = 4.5V. This gives them the lowest on-resistance per die area among similar 30V MOSFETs in the market. In addition, the PMCB60XNE comes with ESD protection rated to 2kV (human body model – HBM) integrated into the tiny 1.0mm × 0.6mm × 0.2mm DSN1006 outline. Both MOSFETs are rated for drain current up to 4A. Efficiency In addition to these two MOSFETs in DSN1006, Nexperia has also introduced the PMCA14UN, a 12V, N-channel trench MOSFET in a DSN1010 package. With max RDS(on) of 16mΩ at VGS = 4.5 V, the PMCA14UN delivers efficiency in the 0.96mm × 0.96mm × 0.24mm (SOT8007) outline. The 30V PMCB60XN and PMCB60XNE, and 12V PMCA14UN, are in production now and available from Nexperia. 
Avolon, the international aircraft leasing company, announced that its Chief Executive Officer (CEO), Dómhnal Slattery, has informed the Board of his intention to step down from his Executive role and from the Board in 2022. Avolon’s Board has unanimously appointed Andy Cronin, Avolon’s President & Chief Financial Officer (CFO), to the role of CEO Designate. In addition, Paul Geaney, Avolon’s Chief Commercial Officer (CCO) is appointed to the role of the President and Chief Commercial Officer (CCO), with immediate effect. Dómhnal Slattery Dómhnal Slattery is Avolon’s founding Chief Executive Officer (CEO) and has overseen the growth of the business from the largest private equity backed start-up globally in 2010 to becoming the world’s second largest aircraft lessor, with a balance sheet in excess of US$ 30 billion. Having served for 12 years and built a business with a market-renowned team and franchise, Dómhnal Slattery has elected to step down from his Executive role and will now pursue a range of other interests in a Non-Executive capacity. Dómhnal will work closely with the new Chief Executive Officer (CEO), Andy Cronin, over the coming months, in order to ensure an effective transition of leadership. Andy Cronin Andy has played a central role as CFO and member of the Executive Committee Andy Cronin is a globally recognised leader within the aviation industry, having held an array of senior roles across the sector, for more than 20 years. As part of the founding team, and serving as Avolon’s Chief Financial Officer (CFO) for the past 12 years, Andy has played a central role as CFO and member of the Executive Committee, in building the company to the industry-leading position that it holds currently. In addition to his CFO role, Andy Cronin has served as President of Avolon, since July 2021. Dómhnal Slattery, Avolon’s outgoing Chief Executive Officer (CEO), commented “We have built Avolon from a start-up 12 years ago to become a global industry leader. It has been a privilege to lead the business and serve as its CEO since foundation. Avolon is incredibly fortunate to have an individual of Andy Cronin’s calibre to lead it on the next stage of its journey.” Commitment to Avolon’s vision and mission He adds, “Our ambition was to build a global leader with a team which would be recognised as the industry’s best. We have achieved that and I would like to thank the tribe – both past and present – and all of our industry partners and stakeholders for their commitment to realising the vision we had in 2010. Dómhnal Slattery continues, “The legacy of any CEO is the team they build. I am proud to step away from Avolon, leaving the business in a strong financial and competitive position, and in the hands of a leadership team which I know will continue to excel.” Featuring an incredibly talented and motivated team Avolon is a truly great business with an incredibly talented and motivated team” Andy Cronin, the Chief Executive Officer (CEO) Designate, said “Avolon is a truly great business with an incredibly talented and motivated team. I look forward to leading the company through our next phase of development and building on the success of the past 12 years, as we continue to innovate, evolve and grow.” Andy Cronin adds, “Dómhnal has led Avolon to become an industry leading business and made an outstanding contribution to the global aviation industry, during a career spanning over 30 years. On behalf of everyone at Avolon, I would like to thank him for his commitment to the business, as we have navigated our course to becoming an industry leader.” Building Avolon to become a global leader: 2010-Present Founded in 2010, Avolon was the largest privately founded start-up globally that year and Avolon’s launch shareholders included three of the leading private equity firms globally and GIC, the sovereign wealth fund of Singapore. Following four years in private equity ownership, Avolon listed on the New York Stock Exchange (NYSE) in December 2014, in what was, at that time, the largest ever listing on the NYSE by an Irish founded company. Avolon was the subject of a US$ 7.6 billion bid by Bohai Capital in 2015, which delivered a 55% annualised return to shareholders who invested in Avolon’s IPO. In 2017, Avolon acquired the aircraft leasing business of CIT for US$ 10.4 billion, propelling Avolon to becoming the third largest aircraft lessor in world. In 2018, Avolon announced that ORIX was becoming a shareholder in the business, acquiring a 30% stake in Avolon from Bohai Capital for US $2.2 billion implying a then enterprise value of US$ 23.7 billion. In 2019, Avolon successfully achieved its targeted Investment Grade rating – and was rated Investment Grade by Fitch, Moody’s, S&P Global & KBRA. In 2021, Avolon announced an order for 500 eVTOL VX4 aircraft from Vertical Aerospace, which was valued at US$ 2 billion. The order highlighted Avolon’s commitment to sustainability and its position as an industry leader and innovator. Since announcing that order, Avolon placed the entirety of its VX4 order book with leading global airlines. Avolon at a Glance From a standing start, Avolon has grown into the second largest aircraft lessor with total assets of over US$ 30 billion. As of 30 June 2022, Avolon has an owned, managed and committed fleet of 851 aircraft, serving 146 airline customers in 62 countries.
Aratek has formally launched the BM7550 terminal, a portable, powerful multi-factor biometric tablet that integrates facial recognition, fingerprint sensing, and a contactless NFC card reader in one complete package. ‍The portable & powerful biometric tablet for multi-factor authentication “The BM7550 squarely addresses the demands for increasingly sophisticated identification and authentication solutions with its industry-leading multi-biometric and multi-factor authentication features,” said Samuel Wu, Aratek’s vice president for International Business Division. “By integrating facial recognition, fingerprint sensor, and contactless NFC in a single solution, the BM7550 terminal gives unparalleled security, accuracy, and reliability,” Wu added. BM7550 BM7550 uses a durable optical scanner that is fully compliant with FBI FAP20, STQC, ISO19794-2 The BM7550 is powered by Aratek’s patented face recognition algorithm which boasts a recognition rate of 99.72% in the LFW face database. In addition, it features a 2MP Dual HDR Camera which gives high-quality facial image capture in all lighting conditions, whether in a dark room or in the bright outdoors. The BM7550 uses a durable optical scanner that is fully compliant with FBI FAP20, STQC, ISO19794-2, ANSI-378, and WSQ standards. It also supports live detection to ensure liveness and user presence, thereby thwarting fraud. Features  The BM7550 is equipped with USB Type-A, Micro USB (OTG), RJ45 LAN, WIFI and Bluetooth, etc., which supports both wired and wireless connectivity for the ultimate convenience in reliable data transfer. The power supply for the BM7550 is also versatile. It comes with a removable ultra long-lasting 6000mAh battery (optional 10000mAh battery) which enables long offsite work without the need to frequently top up the charge, and this powerful terminal can be charged with a built-in DC charging port as well. The BM7550 also has a GPS chip embedded in it to enable the accurate tracking of the device’s location, as well as auto-record and playback of travelled routes for better management. ‍The perfect biometric device for mobile identification and authentication ‍With great reliability and mobility, the mobile biometric device: BM7550 is well-suited for a great number of applications including time and attendance monitoring, homeland security, law enforcement, voter verification, healthcare, etc. “Aratek’s relentless pursuit of innovation is making possible the development of products such as the BM7550 which are addressing emergent needs in the market. Expect us to continue coming up with biometric identification and authentication solutions that really make a difference,” Wu said.
As the coronavirus (COVID-19) pandemic spreads and the situation evolves rapidly around the world, CloudSense is keenly aware of their responsibility to their customers, prospects and partners. CloudSense would like to reassure everyone that while the COVID-19 pandemic might change the way the world works together, it won’t stop the company from doing so. CloudSense’s platform and people will continue to perform dependably for all businesses. Despite the uncertain times, CloudSense have clear priorities, which include: The safety of their employees, customers, prospects and partners Continuing to deliver their technology and services for their customers Stopping the spread of the virus in any way they can CloudSense CloudSense is continually updating their teams with the information and tools that they need to make sure that they are empowered to act on these priorities. As a global team, they are well-versed in working and collaborating remotely. They’re here to support everyone and the company is confident that they can successfully navigate this unprecedented situation together.
Super Micro Computer, Inc., a pioneer in enterprise computing, storage, networking solutions, and green computing technology, releases its third annual Data Centres and the Environment report based on an industry survey of over 400 IT Managers and CxOs. The results show that data centre managers are making progress in implementing green computing practices, but there is still room for significant improvement. A mid-scale-sized data centre with 50 racks can save over $150,000 per year with just a 10% reduction in electricity used in a legacy data centre that relies on four-year-old technology. Data centre equipment Supermicro conducts this annual survey to report on the state of the industry, assess data centre equipment purchase considerations, and help data centre leaders better quantify their decisions for the long-term environmental impact through energy savings and E-waste reduction. Supermicro continues to work with our customers and partners to reduce the effect on the environment” “Supermicro continues to work with our customers and partners to reduce the effect on the environment that their data centres are responsible for,” said Charles Liang, President and CEO, Supermicro. “We strongly believe that data centre operators can take actions to reduce their TCE. This survey reinforces our belief that many organisations worldwide are considering their impact on the environment. We look forward to supplying energy-efficient servers to our customers worldwide to reduce operating expenses and save Mother Earth.” Upgrading critical components Several key findings stand out: Worldwide, while about 50% of data centre operators listed ‘Upgrading critical components’ as their #1 area of investment in 2021, the same amount did not buy into upgrading to the newest and most energy-efficient technologies. Almost a third of respondents held onto their systems for four years or more, resulting in outdated and inefficient technologies being used. While delivering more power to a rack results in greater efficiencies, only about 30% were delivering 40kW or more to their compute and storage racks. E-Waste was important to organisations worldwide and was essential to only about 50% of the respondents. Datacentre operators in the APAC region were willing to run their systems at a higher temperature than in NA or EMEA. Higher inlet temperatures Actions such as allowing higher inlet temperatures, installing more servers per rack, lowering their amount of E-waste, and replacing components selectively can all contribute to reducing the TCE of a data centre. The Supermicro Data Centers & the Environment 2021 report is available for download. In addition, Supermicro is hosting a live webinar with industry experts on the report, its findings, and general state of the data centres. The live webinar is on Tuesday, March 23, 2021.
J2 Acquisition Limited (J2) has announced that it has completed its acquisition of APi Group, Inc. (APi Group), a market-renowned provider of commercial life safety solutions and specialty services for approximately US$ 2.9 billion. With the closing of this transaction, J2 has been renamed APi Group Corporation (the ‘Company’). The Company’s ordinary shares continue to be traded on the OTC market in the U.S. under the symbol – JJAQF. J2 completes acquisition of APi Group The transaction was funded through a combination of cash on hand, US$ 1.2 billion from a new secured term debt financing and the issuance of 48.9 million ordinary shares at US$ 10.25 per share. With the completion of this acquisition, we begin the next chapter for APi” As previously announced, and in connection with the close of the transaction, Russell E. Becker and Thomas Lydon will continue to serve as the Chief Executive Officer (CEO) and Chief Financial Officer (CFO), respectively, of the Company. J2 Acquisition Limited’s Co-Founders, Sir Martin E. Franklin and James E. Lillie have been appointed as Co-Chairmen of the Board of Directors of the Company. James E. Lillie commented, “With the completion of this acquisition, we begin the next chapter for APi. Martin and I are excited to partner with the Company’s impressive leadership team and the 15,000 leaders throughout the organisation. We look forward to building upon APi’s proven track record of organic growth, complemented with disciplined M&A to grow within its niche markets and capitalise on adjacent opportunities to generate long-term value for stakeholders.” New Board of Directors appointed The Company has also announced the composition of its Board of Directors in connection with the closing of the transaction. As previously announced, J2 Co-Founder, Ian G.H. Ashken and APi CEO, Russell Becker have assumed Director roles at the Company. J2 Board members – Thomas Milroy and Lord Paul Myners of Truro will be joined by Anthony E. Malkin, Chairman and CEO of Empire State Realty Trust, Cyrus D. Walker, Founder and CEO of The Dibble Group, and Carrie A. Wheeler, former Partner at TPG Global to comprise the new board. The next phase of growth and development Given the North American focus of API Group, Rory Cullinan and Jean-Marc Huët have stepped down from the J2 Board; and in connection with the closing, Brian Kaufman has also stepped down from the J2 Board. Russell E. Becker stated, “I am tremendously excited to lead the Company into its next phase of growth and development with the support of Jim, Martin and Ian. Their decades of leadership and operational expertise will be a great resource for our team as we look to drive forward with even more momentum.” Trading of the Company’s ordinary shares remain the same The Company expects to list its ordinary shares on the New York Stock Exchange under the symbol – APG Trading of the Company’s ordinary shares (LSE: JTWO) and warrants remains suspended on the London Stock Exchange (LSE) following the announcement of the transaction in September. The Company expects to list its ordinary shares on the New York Stock Exchange under the symbol – APG and change its jurisdiction of incorporation to Delaware, in connection with the NYSE listing, which is expected to occur late in the first quarter of 2020. Prior to such time, the Company expects its ordinary shares to continue to trade on the OTC market in the U.S. under the symbol – JJAQF and has commenced the process to make its ordinary shares eligible for settlement through the Depository Trust & Clearing Corporation (DTCC). Financial, Capital Markets and Legal Advisors UBS Investment Bank acted as Financial Advisor, Citigroup as Capital Markets Advisor, Greenberg Traurig acted as Legal Advisor to J2 on the transaction, and Kane Kessler acted as Legal Advisor to J2 on the debt financing. Citigroup, Bank of America Merrill Lynch, Barclays, UBS and U.S. Bank provided financing for the transaction. William Blair & Company acted as Financial Advisor and Faegre Baker Daniels and Fredrikson & Byron acted as Legal Advisors to APi Group on the transaction.
We believe in integrated security solutions, so while a solid gate could prevent sight lines from the house, combining it with other measures such as alarms, motion sensing lighting, and CCTV will allow a good level of surveillance to keep you and your valuables safe. Burglary prevention tips Very few burglars are opportunists; instead, they may be regularly scanning and looking for weaknesses to capitalise on. It is therefore crucial never to give a burglar an opportunity to strike. Of course, the level of security required depends on the house and the area. We’ve outlined some burglary prevention tips to consider when securing your home. Keep radio and lights on  It’s an age-old trick but start by leaving the radio and lights on when you leave the house, to make the property appear occupied. If you have more than one car, park one on your driveway or ask a neighbour if they’d be happy to park their car there for the evening. Check back doors and gates around the perimeter of the home are locked and working effectively. Ideally, hinges and locks should be galvanised to provide added protection against rust. Choose a gate where the hinge and gate sit closely together to deter people from using the hinge as a foothold. Often our gates have the top hinge reversed so they can’t be lifted off. Automated gates, motion-activated security lights Move ladders or large bins away from fences and walls, as these can be used as climbing aids Automated gates are a great way to help reduce access to the property, or grounds. As these gates block sightlines from the house, we would recommend also investing in motion-activated security lights, which will automatically illuminate an area if movement is detected. Lighting should be fitted to the front, side, and rear of the home. Move ladders or large bins away from fences and walls, as these can be used as climbing aids. Lock any tools inside your house, as these could be used to cut through security systems. Anti-burglar boundary Keep garden sheds securely locked, especially if there are high-value items in the shed such as bikes or lawnmowers. You should also padlock these to heavy, static objects so they can’t be easily shifted, should someone break in. Let nature lend a helping hand in creating an effective anti-burglar boundary on your side of any fencing, especially around any side access points. Stocking up on ‘defensive’ plants such as Berberis, Hawthorn or roses can help create an impenetrable barrier that the majority of burglars won’t want to entertain. Gravel paths and drives, trellis panel Install gravel paths and drives to make it difficult for anyone to approach the house without being heard Install gravel paths and drives to make it difficult for anyone to approach the house without being heard. Similarly, lay some gravel near any windows or doors. If you choose to add a trellis panel on top of a fence or gate which takes the overall height to over 2m, you will require planning permission. However, growing a thorny plant along the top of a 2m fence provided it does not feature any support structures does not require planning permission unless there are local restrictions in place. Check with your local planning authority first. Robust, secure perimeter fence and gate  Check that the property is protected by a robust, secure perimeter fence and gate which is sufficiently sturdy to frustrate any attempts to push it over, remove any panels or parts, kick it through or climb over it. Timber fencing is easily compromised if the posts securing the panels are rotten so always seek out a fence that offers a long lifetime guarantee against rot or boring insects. Security solution We also highly recommend that you do your research before settling on a security solution. It is an extensive market of different products, and too many fall into the trap of prioritising aesthetics, without considering quality and effectiveness. One of the main culprits of poor security design is generic steel palisade fencing, commonly used for houses that back onto public areas. Beware of repeated access  While it may look intimidating it does a poor job of resisting penetration. Despite its popularity and the widely held misconception that it offers an adequate perimeter security solution, it has inherent weaknesses that belie its capability. Its wide pales can hamper surveillance, while the bolted construction is a security risk. Simply removing or breaking the lower fixing on one or two pales would allow them to swing aside to give repeated access to the site without leaving any visible sign that the perimeter had been breached.
EZCast, an innovator of wireless display technologies, has announced it will be attending CES 2023 where it will display a range of new and updated wireless display products, including the new EZCast Pocket, EZCast Pro QuattroPod T02+, and new features for the EZCast Ultra. Join EZCast at CES 2023 Date: January 5-8th, 2023 Location: Venetian Expo Booth: #50268 Register a visit on the EZCast website New EZCast Pocket portable wireless display dongle available in USB-C and HDMI Become a pro at video conferencing by wirelessly controlling the presentation, allowing multitasking The new EZCast Pocket is a portable wireless display transmitter and receiver kit that allows users to wirelessly mirror their screen so they can conveniently share and watch streaming media services, photos or apps on a bigger screen. Simply plug and play without installing apps or connecting to a Wi-Fi network. EZCast Pocket connects with either USB-C for laptops or mobile devices supporting DisplayPort Alt Mode, or HDMI for devices like PCs, Android TV or IPTV boxes, and Blu-ray players. Become a pro at video conferencing by wirelessly controlling the presentation, allowing multitasking via mirroring, or extending a display with ease. New EZCast Pro QuattroPod T02+ with HDMI-connected document view camera The new EZCast Pro QuattroPod T02+ is a plug-and-cast dongle that easily connects to any office laptop or mobile device without needing software installation. It securely transmits the display wirelessly with support for 1-to-many display multicasting and 4-to-1 split screen with up to four transmitters. The QuattroPod T02+ enables a document view camera via HDMI and allows anyone in the room, or remote, to present. It supports all major UC platforms, including Microsoft Teams, Zoom, Google Meet, and others. Upgraded EZCast Ultra with peer-to-peer AirPlay mode Screen mirroring from an iPhone, iPad (iOS) or MacBook (macOS) is possible without a Wi-Fi connection, through the new Peer-to-Peer AirPlay feature on the EZCast Ultra. Play and share videos, music, and more on a big screen. Simply press the button once on the EZCast Ultra and switch to Peer-to-Peer AirPlay mode. Wireless display devices that embrace the USB-C ecosystem The TwinX requires zero configuration and offers one-click operation for Full HD display streaming EZCast will be demonstrating its devices embracing the USB-C ecosystem (such as tablets, laptops, and Android phones) that support DisplayPort Alt Mode, including the TwinX universal screen mirroring and extending solution, and Beam J4a portable projector. The TwinX requires zero configuration and offers one-click operation for Full HD display streaming. At the same time, the Beam J4a is an Android-powered portable projector with an integrated battery that’s ready to bring up to 4 hours of streaming media anywhere. Become an expert game streamer with EZCast CatchU EZCast CatchU supports simultaneous live and standalone video recording with a PC/laptop or gaming consoles, such as Nintendo Switch, PS5, or Xbox One. With 4K60 HDMI low-latency pass-through built-in it’s easy to set up with one click to record to USB storage and output at 1080p simultaneously, then simply add the commentary into the gameplay via headset.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Between crime and cold weather, many commercial facilities develop vulnerabilities over the winter period, but door hardware can play a vital role in protecting property says Daniel May of Consort. The temperature has dropped. The nights have drawn in. And many commercial properties now face a tough period of additional challenges. From drastically increased footfall and extended periods of closure to extreme weather conditions, the winter months invite a host of differentials that are seldom considered during the other three seasons of the year. Functional door hardware Throughout the holiday period, buildings and businesses are at a heightened security risk especially, and facility managers must look to prepare their property and its people. Theft is the most common type of misconduct experienced by commercial properties and according to a previous study from The National Office of Statistics, seasonal crime is an area of concern for many, where businesses have been found 22% more likely to encounter robberies between November and January. Throughout the holiday period, buildings and businesses are at a heightened security risk Before facility managers can officially wind down for festive celebrations, it’s essential to address the key areas of vulnerability in a commercial property. And so, where accessibility, security, and fire safety are core themes to consider, decision makers must use this time to review the multiple points of entry located around their premises while recognising the true impact of fully functional door hardware. Assessing access points At the heart of any building’s operation are its access points, or more specifically, its doors. Designed to facilitate access and egress, doors – alongside external windows – also play a crucial role in the security infrastructure of a facility and should be regularly reviewed as part of ongoing risk assessments. Rather unsurprisingly, it’s documented that 67% of burglars choose to enter premises through a door, whereas 29% break-in through the windows. With this in mind, facility managers have a duty to assess the key access points in and around their building to further nullify the risks associated with security breaches. Leaving these areas compromised can paint a larger target on commercial properties – especially while the building is vacant during Christmas and potentially more prone to other criminal activity such as vandalism and arson attacks. Some commercial facilities Some commercial facilities may benefit from the adoption of modernised access control systems Some commercial facilities may benefit from the adoption of modernised access control systems, designed to add a further layer of security while aiding ease of movement around the building. Modern access control systems integrate digital locks and access credentials into a building’s security infrastructure to facilitate higher levels of control. Commonly adopted in hospitality and commercial settings with high footfall, these centralised solutions provide individuals with key card or mobile access identification and grant them admission to areas only when necessary. At the same time, instant updates are delivered to facility managers via smartphone or digital device – allowing users to revoke access and keeping them informed of activity, even when they’re absent from the building. Temporary holiday shutdowns Facility managers are also urged to conduct simple checks to their doors and windows ahead of business closure dates. Facility managers are also urged to conduct simple checks to their doors and windows Aside from confirming access points are closed and locked at the correct times by staff, there’s an onus on decision makers to review their hardware ahead of any temporary holiday shutdowns, ensuring its safe and fit for application. Consider a door’s locks and latches for example, where low quality, damaged and missing hardware will create vulnerable and easy to identify points of entry for opportunists as well as fire safety risks. Periodic maintenance inspections For access points, and for fire door’s specifically, British Standards recommend a building’s designated responsible person conducts regular visual checks of all locks, hinges, apertures, frames and leaves, alongside six-month periodic maintenance inspections. In some cases, insurance companies may insist on minimum security standards for locks, windows and the perimeter doors of a commercial building and so upon locating ineffective or inoperative hardware, reliable replacements – signified by third-party accreditations – should be identified and installed by a professional as soon as possible. Cold weather maintenance Swelling and shrinking may alter door components and can leave gaps in mechanisms A drop in temperature can also have an adverse effect on the operation of a door and put stress on its ironmongery components. The wooden frames located around doors and windows for example, are especially susceptible to cold weather conditions and can occasionally expand and contract – leading to complications with insulation and more crucially, risking the integrity of access points. Swelling and shrinking may alter door components and can leave gaps in mechanisms, generally disrupting its operation. When swollen, a door may damage its closing mechanism, leaving the latch to jam and making it more difficult to open and close – therefore presenting itself as a target for break-ins. Fire safety risk Conversely, a shrunken door may leave unwanted gaps between itself and its hinges, potentially becoming a critical fire safety risk as a result of its inability to compartmentalise smoke and flames effectively. Generally, gaps around a door frame should read between 3 to 4mm, but should they show larger through winter, it’s important to seek advice from the manufacturer or a professional. In more severe cases, door hardware can become frozen and may prompt users to force its operation In more severe cases, door hardware can become frozen and may prompt users to force its operation. Over time, this type of damage can accumulate and leave ironmongery in a state of disrepair, disrupting business and leaving buildings susceptible to security breaches in the process. Key access points Loose screws located on locks or latches for example, can complicate the operation of doors and windows by causing them to rub or stick to the frame, and subsequently, should be tightened or replaced at first indication. While it’s true that facility managers can’t control the external factors that arise with winter, it’s vital to act and undertake appropriate measures internally, and ahead of any Christmas closures. By conducting comprehensive risk assessments and mapping out maintenance periods for key access points, decision makers will form an adequate foundation of security for their building – all while gifting themselves peace of mind in the process.
Adopting facial recognition in access control systems is widespread among businesses and organisations looking to improve building security. There are several important factors to consider when selecting a facial recognition access control system, such as the size of a building and the number of people who will use it. ‍This article will provide an overview of how to choose the most suitable facial recognition access control system for a building security system. This will enable users to make informed decisions and ensure the success of the building security system. ‍How to select the ideal facial recognition access control system for a building? ‍The answer is straightforward: pick the best ones. But it’s not easy to figure out which one will be the ideal solution for users building access. There are a lot of different access control devices and access systems on the market, so users need to think about a lot of things before buying one. ‍When users are looking for a facial recognition access control system, there are a few things that they need to check before making their final decision. Here are a few things to consider in different key implementation stages when selecting a facial recognition access control system: ‍System Planning & Design: The best way to choose is to think about the type of building users want to put the system in ‍It’s hard to say which design for a facial recognition access control system is best. The best way to choose is to think about the type of building users want to put the system in and what they need it for. Here are some questions to help users evaluate their needs during the planning stage. Use them to make a list of the top priorities and then compare the systems on the market to that list. ‍1. What is the purpose of this system? ‍It is critical to consider the system’s purpose. Are users looking for a simple access control solution to secure the building, allowing only authorized people in while preventing unauthorised individuals from entering? Or do they want time and attendance tracking as well as visitor management in addition to access control? ‍Some access control security systems are better suited to specific applications, while others can be used for multiple purposes. For example, Aratek TruFace’s access control solution with a mobile app can provide biometric access control, time and attendance tracking, and visitor management all in one package. To figure out the purpose, talk with the team and a security expert about what the organisations want to get out of putting this system in place. 2. What security levels do users require? The levels of physical security can be improved by using systems that offer multiple access methods ‍There are different levels of security for face recognition access control systems. Based on the authentication method, some systems use single-factor authentication, which only checks the person’s face to see if they are who they say they are. ‍Some others use multi-factor authentication, which uses things like facial recognition, fingerprint authentication, card reading, barcode scanning, etc. to verify users. The levels of physical security can be greatly improved by using these kinds of systems that offer multiple access methods. Single-factor or multi-factor authentication ‍Users need to decide what level of security they want and whether they want to use single-factor or multi-factor authentication. The security level of user data storage is also critical because data can be illegally accessed if the system lacks a good security policy. In general, there are three options for storing user data: on-premises, cloud, and hybrid cloud. Each method has advantages and disadvantages, and users must decide what level of data security they want to implement in their application before inventing the system. 3. What physical security infrastructures do users have? ‍When purchasing for an access control system, consider the existing management systems in place, as well as the physical security features (such as door locks, card readers, access control terminals, and video surveillance cameras) in a building. ‍Then, try to answer the question, “Can users easily upgrade or add a facial recognition system to the current infrastructure?” For smooth integration, users may want to go with a system that offers not only a rich set of software development kits (SDKs) and application programming interfaces (APIs) but also solid technical support. ‍4. What is the budget? Users can prioritise the main features that a system should have and allocate money for each feature ‍When planning the system’s budget, make sure to include all necessary hardware, software, and human resources. Additionally, ensure that the user’s budget includes adequate funds for system maintenance and support. Users can prioritise the main features that a system should have and allocate money for each feature to better manage the budget. This will allow users to allocate their budget more efficiently while also ensuring the security of their system. If the budget is insufficient after allocating it, users can adjust their requirements and add more features in the future, but users have to choose a system that is scalable enough to support their company’s growth. ‍Users & Environments: ‍When choosing a facial recognition access control system, it’s important to think about who will use it and where it will be used. The system will be more difficult to design and manage if more people use it and more environmental factors are involved. This is also about how easy the system is to use for better entry experiences and how safe it is. So, think about the following questions when users had the basic plan for the system: ‍1. Who will be using the system? ‍First, users need to think about the people who will use the facial recognition system. Depending on the environment and applications, the users are different. Users could be employees, visitors, VIPs, or residents, and they all have their roles, functions, and requirements. Then users need to think about where they are. Knowing who will be using the system is the key to obtaining a frictionless access control solution For example, employees will be in their offices, visitors will be in the lobby or reception area, VIPs will be in high-end hotels, and most residents will be at home. The system should give different users different service levels. Knowing who will be using the system is the key to obtaining a frictionless access control solution that meets the real needs of both the users and their organisation. ‍2. How many users will use the system? ‍When choosing an access control solution, it’s also important to think about how many people will use it. If a lot of employees are going to use it, users may need to choose a system with a fast facial recognition speed and a data server that can handle the load. ‍3. Who are the visitors? ‍If users want to keep track of how many people enter a building and who they are, then they will also need an access control system that has integrated visitor check-in functionalities. These features will allow users to easily control visitor access while also keeping track of information about each person who enters a building. ‍4. How many doors or gates do users need to control? ‍When choosing a facial recognition access control system, users should think about how many doors or gates will be controlled. Users can choose a standalone access control system if they only want to control one door or gate. ‍If users need to control a lot of doors or gates, they should choose a server-based system with a high-capacity data server and the ability to control and monitor multiple entries from one place. ‍5. Where will the facial recognition devices be installed? If the user’s system is going to be installed outside, the camera should be able to work well in direct sunlight ‍When selecting a facial recognition access control system, it is critical to consider whether the facial recognition access control terminals will be installed in direct sunlight or low-light conditions, indoors or outdoors, and so on. These factors will have an impact on the system’s performance. ‍For example, if the user’s system is going to be installed outside, the camera should be able to work well in direct sunlight, and the facial recognition terminals should have ingress protection of at least IP65 to ensure the face detection will work well in rain, snow, or sand storms. ‍6. What installation types are required? ‍Facial recognition access control terminals can be installed in a variety of ways, including wall mounting, gate types, floor stands, and desktops. It is dependent on the users’ installation environment; for example, if the area is heavily trafficked, gate types are most likely the best option. Wall-mounted and floor-stand types are excellent choices for an indoor environment. ‍Users must consider what installation types are appropriate for their building access and choose a system that offers a variety of installation options. ‍Manage & Maintain: ‍When selecting a facial recognition access control system, consider how easy it will be to manage and maintain. It is critical to manage the system and keep it running smoothly. Some key questions to consider are as follows: ‍1. Who will manage the system? ‍It is essential to know who or which departments will be in charge of the facial recognition access control system. If users don’t have enough people to manage the system, they should think about which software to use. ‍For example, users can select an access control software platform with a simple and intuitive management interface that is simple to use even for non-technical people; this will allow them to manage the system easily without hiring additional staff. ‍2. What type of security measures do users need? If users require security for their sensitive information, they should select a system that includes security features ‍Users should think about what kind of security measures are required for their system. If they require greater security for their sensitive user data and information, they should select a system that includes security features such as encryption, backup, real-time audits, and lockdown management, among others. These features will assist users in better managing and protecting their data. ‍3. What type of support do users need? ‍Users should consider what kind of system support they require. Users can choose a system with good support to ensure working efficiency and continuous productivity. The Service Level Agreement (SLA) is an important consideration when purchasing a system. To determine the SLA, users might also inquire about the vendor’s support policy. The SLA should meet users’ needs and be adaptable to accommodate any changes or expansions to the system. ‍Final thoughts ‍In conclusion, when selecting a facial recognition access control system for building security, it is critical to carefully evaluate users’ specific needs and take into account a variety of factors. These include the needs of the specific building, the level of security required, the budget, and so on. ‍Taking these factors into consideration, users can find a system that will provide the ideal level of security for their building while also having the ability to expand as their business grows. If users need help choosing the ideal facial recognition access control system for their needs, use Aratek’s checklists to get started.
Zimperium, the only mobile security platform purpose-built for enterprise environments revealed details of a newly discovered Android malware campaign hidden in money lending apps developed with Flutter, a software development kit used to create applications that work across multiple platforms, including Android and iOS. The Zimperium zLabs team discovered this threat, dubbed MoneyMonger, which uses personal information stolen from a device to blackmail victims into paying more than the terms that their predatory loans required. This code is part of a larger predatory loan malware campaign previously discovered by K7 Security Labs. MoneyMonger MoneyMonger takes advantage of Flutter’s framework to obfuscate malicious features and complicate the detection of malicious activity by static analysis. Due to the nature of Flutter, the malicious code and activity now hide behind a framework outside the static analysis capabilities of legacy mobile security products. The MoneyMonger malware is solely distributed through third-party app stores or is sideloaded onto the victim’s device through phishing messages, compromised websites, social media campaigns, or other tactics. It has not been found in any Android app stores. Quick loan programmes In the process of setting up the app, the victim is told that permissions are needed on the mobile endpoint Active since May 2022, this novel malware uses multiple layers of social engineering to take advantage of its victims, beginning with a predatory loan scheme promising quick money. In the process of setting up the app, the victim is told that permissions are needed on the mobile endpoint to ensure they are in good standing to receive the loan. Blackmail via stolen information Once the malicious actors gain access to steal private information from the endpoint, MoneyMonger uploads victims’ critical and personal data to its server, including installed apps, GPS locations, SMS, contact information, device information, metadata of images, and more. This stolen information is used to blackmail and threaten victims into paying excessively high-interest rates. If the victim fails to pay on time, and in some cases even after the loan is repaid, the malicious actors threaten to reveal information, call people from the contact list, and even send photos from the device. Sensitive data collection MoneyMonger is a risk to individuals and enterprises because it collects a wide range of data from the victim’s device, including potentially sensitive enterprise-related material and proprietary information. The malicious actors behind MoneyMonger are constantly developing and updating the app to avoid detections by adding XOR encryption in the string on the Java side, while also adding more information on the Flutter-dart side. Scamming the victims The total number of victims is unknown due to the use of third-party stores and sideloading for distribution The total number of victims is unknown due to the use of third-party stores and sideloading for distribution, however many of the unauthorised app stores report over 100,000 downloads of the malicious application. “The extremely novel MoneyMonger malware campaign highlights a growing trend by malicious actors to use blackmail and threats to scam victims out of money,” said Richard Melick, Director of Mobile Threat Intelligence at Zimperium. Predatory models  “Quick loan programmes are often full of predatory models, such as high-interest rates and payback schemes, but adding blackmail into the equation increases the level of maliciousness.” “Any device connected to enterprise data poses a risk to the enterprise if an employee falls victim to the MoneyMonger predatory loan scam on that device.”
IDEMIA, the pioneer in identity technologies announced the launch of its first service centre in Japan as a reflection of its commitment to supporting digital advancement in the country. Located in Kawasaki, the service centre can support millions of users and aims to partner with Japanese credit card issuers to deliver premier products and services for end users in Japan. This includes IDEMIA’s advanced card personalisation offerings such as F.CODE, recycled PVC cards, metal cards, and more. Global-level products and services As a key technology provider, IDEMIA seeks not only to catalyse competition in the Japanese financial market but also to introduce global-level products and services that will benefit the end users of Japan. It is the first multinational corporation to address the Japanese financial institutions market, which has long been closed to international suppliers due to the industry’s unique card specifications and ecosystem, throughout the country’s long credit card history. Transition to a cashless society The new service centre further expands IDEMIA’s renewed commitment to the Japanese market The opening of the new service centre thus further expands IDEMIA’s physical presence in Japan and marks the company’s renewed commitment to the Japanese market. “IDEMIA has been honoured to support Japanese financial institutions in delivering advanced banking and payment offerings for years, and this new service centre will further expand our capacity to accelerate Japan’s transition towards a fully cashless society,” said Nezu Nobuyoshi, Vice President of Japan Sales at IDEMIA. State-of-the-art card personalisation offerings “IDEMIA will be in Japan for the long term, and we are committed to bringing in world-class products and services, including our state-of-the-art card personalisation offerings. We are investing in Japanese people and speciality Japanese products, as well as providing global support for projects in Japan and we look forward to entering new industries within the unique Japanese market.”  Operating since 2008, IDEMIA Japan supports major mobile network operators (MNOs) and mobile virtual network operators (MVNOs) in the country with connectivity solutions such as eSIM. Digital payment solutions IDEMIA used biometric access solutions for clients to protect their critical infrastructure IDEMIA Japan also played a key role in the deployment of various major digital payment solutions as well as digital key products for automobile manufacturers in Japan. Additionally, it has deployed biometric access solutions for clients to protect their critical infrastructure and maintain public security in the country. In 2020, IDEMIA’s new Japanese head office was launched in Shibuya District, Tokyo, as well as a new experience centre to display IDEMIA technologies for business and government solutions. JIS2-compliant banking card Most recently, IDEMIA launched its first banking card, which is compliant with the JIS2 standard and was supplied to domestic major issuers and FinTech issuers in Japan. IDEMIA has also partnered with Japanese corporations to test and deploy biometric authentication technology, this includes payment experience through IDEMIA biometric devices such as MorphoWave™.
Large-scale events, including both corporate and sporting events, are coming back strongly in the aftermath of the pandemic. With the increase in activity comes more demand for oversized credentials preferred by many event planners and end users. Pent-up demand due to the pandemic has caused a tremendous uptick in the entire ID card industry in 2022. The return of large-scale events and in-person trade shows will extend the higher demand for cards well into 2023 and beyond, says Andrew Schonzeit, President of Idesco, a provider of ID card solutions. Supply chain concerns Supply chain concerns will continue as companies seek to upgrade and purchase new ID printers and badges An impact of the pandemic was a shortage of supplies related to the ID card industry, says Schonzeit. Like other industries, several leading ID card and printer manufacturers had supply chain issues, and some deliveries were delayed at times for more than six months. Supply chain concerns will continue into 2023 as more companies return to the workplace and others seek to upgrade their current systems and purchase new ID printers and badges.  Persistent price increase concerns “The shortage created hardships for end users and often resulted in them purchasing any solution that was readily available even if it was not the preferred one,” says Schonzeit. Another issue during the pandemic was persistent price increases, due both to inflationary pressures and a shortage of products. The industry was used to stable prices with infrequent increases, but the pandemic changed this quickly. Some companies also decided to upgrade their entire system as employees returning to the office increased demand.  Oversized credentials advantages Among the advantages of oversized credentials is the ability to print more information on the card, says Schonzeit. For example, a larger credential allows event organisers to preprint the corporate agenda on the back of the card to increase efficiency. In addition, companies can enhance their brand presence by distributing a nice thick plastic badge to attendees. Two categories  Standard credit card size These are generally CR100 size, which is around 40% larger than the standard credit card Oversized badges fall into two main categories. One category is for cards that are larger than the standard credit card size (CR80), but smaller than event badges. These are generally CR100 size, which is around 40% larger than the standard credit card. They are generally used by law enforcement or healthcare institutions. It is easier to see an oversized badge more clearly from a distance than a regular-sized badge. Oversized ID badges The other category of oversized ID badges is used for events, these badges are typically 3.5” by 5.5” and are usually worn around the neck. These events include categories such as sporting events, corporate events, music festivals, and trade shows. The badges are generally used only for the duration of the event and are often kept as souvenirs. Anticipating the needs  “My advice for event planners is to manage your expectations about badges as it is very hard to order extra badges at the last minute,” says Schonzeit. “It is important to plan well in advance and anticipate your needs upfront to help avoid a shortage.” Idesco often gets requests from customers to include some type of technology on the credentials. The most common technologies are proximity cards, NFC, and/or UHF. “It is a much ‘cleaner’ and safer solution if the chip can be embedded within the credential as opposed to putting a sticker on the outside of the credential,” says Schonzeit. Additional technologies in credentials  Customers wanting technology in their credentials should allow additional lead time Generally, these additional technologies are used for gaining entry to a location (access control), or they can be used for gathering valuable information regarding an event, including attendance at seminars, crowd flow, vending, and food services information, among others. Supply chain issues have led to less availability of many of the most common chips, which can impact delivery times. Customers wanting technology in their credentials should allow additional lead time, says Schonzeit. Applications  In addition to corporate events, sporting events, and trade shows, other markets can also benefit from oversized ID badges. Industries include healthcare, government, and law enforcement. Oversized badges are becoming more popular in hospitals, for example, where color coding can make it easy to identify doctors, nurses, and hospital personnel from a distance, even in congested hospital spaces. ID card necessity  Could there be a negative impact on the ID card industry if more companies allow employees to work from home? It’s always a possibility, says Schonzeit. “However, with many hybrid options out there, most employees are required to come to the office either one or two days a week,” he says. “Employees will still need a way to access their workplace for meetings, conferences, etc., and will require an ID card to do so.”   Mobile vs. physical credentials The growing popularity of mobile credentials has created some concerns in the ID card marketplace The growing popularity of mobile credentials has created some concerns in the ID card marketplace about the continuing need for a physical credential. So far it has not been an issue. “[Mobile credentials] have not had any type of meaningful effect on the physical ID card market,” says Schonzeit. Relying on smartphones  “Sometimes these disruptive technologies can linger in the background for some time and then suddenly have a massive effect on the market. This is something to be concerned about, but I don’t think there is an imminent threat.” A big issue with using only mobile credentials is the need for a backup plan rather than relying only on a smartphone to enter a facility. Also, for mobile credentials to work, specialised readers are required, which requires a large investment. “In my opinion, ID badges are here to stay for the long haul,” says Schonzeit.
ProdataKey (PDK), manufacturer of the cloud access control platform built for mobile, now offers a unique wristband credential made of attractive, comfortable and durable fabric. These stretchable, slip-on/slip-off wristbands are designed for users with an active lifestyle. They’re ideal for schools, community centres, gyms, public pools and other locations where users may not want to carry a phone, wallet or traditional card or fob. Both rugged and waterproof, they can be worn during any activity. The new PDK wristband credentials operate with all 125-kilohertz access control readers, including those manufactured by PDK and by competitors. They are available for order in lots of 25. Each measures 1 inch wide and is available with a 6 ½ inch or 7 ½ inch circumference. Wristband credentials “With the introduction of our unique wristband credentials, PDK’s anytime, anywhere convenience extends to users who crave a seamless, untethered access experience.” “They can enter secure areas and enjoy their favourite activities phone-free, pocket-free and lanyard-free. Wearing a wristband is as easy as it gets,” says Brach Bengtzen, PDK’s Director of Marketing.
5 question check-up: Test your camera's cybersecurity
IoT connectivity
2023 trends in video surveillance
Anatomy of a false alarm
Bank security
What does the Metaverse mean for security?
How are edge devices transforming security?
What’s the new buzzword and how does it reflect the security market?
Dahua DH-SD6C3425XB-HNR-A-PV1 4MP 25x Starlight IR WizSense Network PTZ Camera
Doorking ProxPlus™ Secure Card Readers
The ME8 Series IP Cameras from March Networks
Follow us
Security experts from Ontic, Hakimo, Eagle Eye Networks, Inc., TDSi, Axis, Athena Security, Inc., Anviz Global Inc., Salient Systems, Pimloc Limited discuss "What will be important technology developments in the second half of 2022?"
SourceSecurity.com – Making the world a safer place
Copyright © Notting Hill Media Limited 2000 – 2022, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACInformed.com | MaritimeInformed.com | ElectricalsInformed.com
Browsing from the Americas? Looking for our US Edition?
View this content on SecurityInformed.com, our dedicated portal for our Americas audience.


Leave a Comment

Your email address will not be published.