SP_1502DGD

76
www.security-today.com Integrated New Product and Technology Solutions for Security Professionals February 2015 Vol. 19, No. 2 Samsung Ultimate flexibility and performance Samsung’s SNF-8010 and the mobile SNF-8010VM fisheye cameras are omnidirectional cameras that offer 5-megapixel definition with digi- tal pan/tilt/zoom (P/T/Z), intelligent video analytics and on-board SDXC storage up to 64GB. Images captured with the SNF-8010/8010VM fish- eye cameras can be dewarped and/or displayed in a variety of configurations, including single or double panorama and 360° view as well as other view configurations. Images can also be dewarped on the client side for viewing and recorded in full 360° view prior to dewarping. Samsung. Go to sp.hotims.com and enter number 300 for product information. PPM Incident, investigation and case management software Perspective by PPM is an end-to-end enterprise solution for respond- ing to, reporting on and investigating incidents. Available in four edi- tions based on the event types the user needs to manage, Perspective enables security operations and investigations to collaborate, share incident information and reporting, identify trends, take action and reduce risk. With the ability to integrate to any application, Perspective can share data with diverse systems to help deliver mean- ingful insights and information. PPM. Go to sp.hotims.com and enter number 301 for product information. IDIS Global End-to-end surveillance DirectIP from IDIS is an end-to-end surveillance solution that delivers benefits across the entire security buying chain. A one-stop shop, truly plug-n-play, comprehensive range of HD cameras, monitors, NVRs and VMS, DirectIP can be purchased a’la carte, or as scalable, customized solutions for enterprises of any size. DirectIP is how IDIS is meeting the needs of an increasingly demanding security landscape through flexible and cost- effective technology, with unrivalled performance and proven quality. IDIS Global. Go to sp.hotims.com and enter number 302 for product information. VITEK Enhanced network integration with ENVI cameras The VITEK ENVI IP Camera Series exemplifies the Vitek commitment to innovation and technology while offering both value and simplic- ity. The UL-certified , IP68 ENVI 2.1 megapixel 2.4x auto zoom/focus IR LED bullet camera offers real time live video up to 30 FPS, at 1920x1080p over TCP/IP; has a 300-foot IR range; provides an SD card slot for onboard EDGE recording and playback; and has a quick mount wall plate that makes installation a breeze. ONVIF 14.06 and direct Integration with many of the industry’s most trusted VMS brands. VITEK. Go to sp.hotims.com and enter number 303 for product information. Speco Technologies No licensing fees SecureGuard Plus, Speco Technologies’ free CMS software allows users to view, review and record any of Speco’s devices with no licensing fees. SecureGuard Plus provides access and control to multiple DVRs, NVRs and IP cameras from anywhere, all at the same time. Users can remotely view and manage playback and other functions to effortlessly assist surveillance personnel. Easy to install, free software updates and EZ Search functionality help search events fast, using thumbnails. Speco Technologies. Go to sp.hotims.com and enter number 304 for product information. Hikvision USA Prolonging investment in existing infrastructure Hikvision’s Turbo HD line uses HDTVI technology to provide up to 1080p video over coaxial cable at distances up to 1,500 feet or more. The 7200 series “tribrid” DVR can save data from standard defi- nition analog cameras, IP cameras and HDTVI cameras simultaneously. Live video can be viewed in high resolution without latency because the video stream is uncompressed. Hikvision’s Turbo HD is ideal for migration from standard definition to high definition, maximizing return on investment because existing infrastructure doesn’t need to be replaced. Hikvision USA. Go to sp.hotims.com and enter number 305 for product information. Dotworkz THE B.A.S.H—Broad Application Security Housing Established in 1998 Dotworkz, a USA-based company and a pioneer manufacturer of security accessories that go to the extreme. The BASH is the latest in mobile camera protection for security and marine ap- plications. Features include: IP68, theft proof design, 12 point vibration isolation, 6061 Type III MIL-A-8625 hard anodized alloy, stainless steel reflective optics and a thermal regulation system. The BASH is compatible with all GoPro and mini dome cameras. Dotworkz. Go to sp.hotims.com and enter number 306 for product information. To see AXIS Q6000-E in action, visit www.axis.com ĂŵƉƵƐ sŝĚĞŽ ^ƵƌǀĞŝůůĂŶĐĞ ^ŝŵƉůŝĮĞĚ DĂdžŝŵŝnjĞ ǀŝĚĞŽ ƐƵƌǀĞŝůůĂŶĐĞ ĐŽǀĞƌĂŐĞ ǁŚŝůĞ ƌĞĚƵĐŝŶŐ ĐŽƐƚ 9LGHR ,QVLJKW 906 VRIWZDUH SURYLGHV DQ HDV\WRXVH IHDWXUHULFK HQWHUSULVH VROXWLRQ WKDW LQWHJUDWHV ZLWK PRVW SRSXODU DFFHVV FRQWURO DQG VXSSRUWV RYHU FDPHUD PRGHOV IURP RYHU PDQXIDFWXUHUV .H\ %HQHWV 6LPSOH DQG (DV\WRXVH 6FDOH ZLWKRXW OLPLWDWLRQV $FFHVV &RQWURO ,QWHJUDWHG )UHH PRELOH FOLHQWV $QGURLG,26 )RU PRUH LQIRUPDWLRQ YLVLW XV DW KWWSZZZYLGHRLQVLJKWFRPVRIWZDUHLQGH[SKS Go to sp.hotims.com and enter 41 for product information.

description

SECURITY PRODUCTS 02/2015

Transcript of SP_1502DGD

  • www.security-today.com

    Integrated New Product and Technology Solutions for Security Professionals February 2015 Vol. 19, No. 2

    SamsungUltimate flexibility and performanceSamsungs SNF-8010 and the mobile SNF-8010VM fisheye cameras are omnidirectional cameras that offer 5-megapixel definition with digi-tal pan/tilt/zoom (P/T/Z), intelligent video analytics and on-board SDXC storage up to 64GB. Images captured with the SNF-8010/8010VM fish-

    eye cameras can be dewarped and/or displayed in a variety of configurations, including single or double panorama and 360 view as well as other view configurations. Images can also be dewarped on the client side for viewing and recorded in full 360 view prior to dewarping. Samsung.Go to sp.hotims.com and enter number 300 for product information.

    PPMIncident, investigation and case management softwarePerspective by PPM is an end-to-end enterprise solution for respond-ing to, reporting on and investigating incidents. Available in four edi-tions based on the event types the user needs to manage, Perspective enables security operations and investigations to collaborate, share incident information and reporting, identify trends, take action and reduce risk. With the ability to integrate to any application, Perspective can share data with diverse systems to help deliver mean-ingful insights and information. PPM.Go to sp.hotims.com and enter number 301 for product information.

    IDIS GlobalEnd-to-end surveillanceDirectIP from IDIS is an end-to-end surveillance solution that delivers benefits across the entire security buying chain. A one-stop shop, truly plug-n-play, comprehensive range of HD cameras, monitors, NVRs and VMS, DirectIP can be purchased ala carte, or as scalable, customized solutions for enterprises of any size. DirectIP is how IDIS

    is meeting the needs of an increasingly demanding security landscape through flexible and cost-effective technology, with unrivalled performance and proven quality. IDIS Global.Go to sp.hotims.com and enter number 302 for product information.

    VITEKEnhanced network integration with ENVI camerasThe VITEK ENVI IP Camera Series exemplifies the Vitek commitment to innovation and technology while offering both value and simplic-ity. The UL-certified , IP68 ENVI 2.1 megapixel 2.4x auto zoom/focus IR LED bullet camera offers real time live video up to 30 FPS, at 1920x1080p over TCP/IP; has a 300-foot IRrange; provides an SD card slot for onboard EDGE recording and playback; and has a quick mount wall plate that makes installation a breeze. ONVIF 14.06 and direct Integration with many of the industrys most trusted VMS brands. VITEK.Go to sp.hotims.com and enter number 303 for product information.

    Speco TechnologiesNo licensing feesSecureGuard Plus, Speco Technologies free CMS software allows users to view, review and record any of Specos devices with no licensing fees. SecureGuard Plus provides access and control to multiple DVRs, NVRs and IP cameras from anywhere, all at the same time. Users can remotely view and manage playback and other functions to effortlessly assist surveillance personnel.Easy to install, free software updates and EZ Search functionality help search events fast, using thumbnails. Speco Technologies.Go to sp.hotims.com and enter number 304 for product information.

    Hikvision USAProlonging investment in existing infrastructure

    Hikvisions Turbo HD line uses HDTVI technology to provide up to 1080p video over coaxial cable at distances up to 1,500 feet or more. The 7200 series tribrid DVR can save data from standard defi-nition analog cameras, IP cameras and HDTVI cameras simultaneously. Live video can be viewed in high resolution without latency because the video stream is uncompressed. Hikvisions Turbo HD is ideal for migration from standard definition to high definition, maximizing return on investment because existing infrastructure doesnt need to be replaced. Hikvision USA.Go to sp.hotims.com and enter number 305 for product information.

    DotworkzTHE B.A.S.HBroad Application Security HousingEstablished in 1998 Dotworkz, a USA-based company and a pioneer manufacturer of security accessories that go to the extreme. The BASH is the latest in mobile camera protection for security and marine ap-plications.Features include: IP68, theft proof design, 12 point vibration isolation, 6061 Type III MIL-A-8625 hard anodized alloy, stainless steel reflective optics and a thermal regulation system. The BASH is compatible with all GoPro and mini dome cameras. Dotworkz.Go to sp.hotims.com and enter number 306 for product information.

    To see AXIS Q6000-E in action, visit www.axis.com

    s

    ^^

    D

    9LGHR,QVLJKW906VRIWZDUHSURYLGHVDQ

    HDV\WRXVHIHDWXUHULFKHQWHUSULVHVROXWLRQWKDW

    LQWHJUDWHVZLWKPRVWSRSXODUDFFHVVFRQWURODQG

    VXSSRUWVRYHUFDPHUDPRGHOVIURPRYHU

    PDQXIDFWXUHUV

    .H\%HQHWV

    6LPSOHDQG(DV\WRXVH

    6FDOHZLWKRXWOLPLWDWLRQV

    $FFHVV&RQWURO,QWHJUDWHG

    )UHHPRELOHFOLHQWV$QGURLG,26

    )RUPRUHLQIRUPDWLRQYLVLWXVDWKWWSZZZYLGHRLQVLJKWFRPVRIWZDUHLQGH[SKS

    Untitled-8 1 1/16/15 2:12 PM

    Go to sp.hotims.com and enter 41 for product information.

    0215sec_0c1_v2.indd 1 1/21/15 2:52 PM

  • AXIS Q6000-E features four separate 2-megapixel sensors, providing a 360 eld of view over large areas. And when integrated with any AXIS Q60-E Series of PTZ outdoor cameras, it even allows you to optically zoom in on any areas of interest. For all the features and to see AXIS Q6000-E in action, visit www.axis.com

    BIGAXIS Q6000-E Network Camera

    picture.

    Get the detailsand the

    Distributed by:

    Count on it.

    Visit Axis at BICSI Winter Conference:

    Booth #307February 23-25

    Orlando, FL

    Go to http://sp.hotims.com and enter 9 for product information.

    Untitled-17 1 1/7/15 3:00 PM

  • THE PERFECTMATCH

    Combining its award-winning video management software with high-performance hardware, Milestone Systems now oers the Milestone Husky Series, available in three models use one asa simple standalone or connect multiple models and choose from more than 50 options for a truly customizable and scalable solution. The series is compatible with thousands of cameras and supports Milestone services such as Customer Dashboard to enable your installer to monitor the health of your system and proactively resolve technical issues. Milestone Husky appliances make it easy to find a configuration to meet the needs of any surveillance solution!

    Learn more: www.milestonehusky.com

    Why stop at software?

    Go to http://sp.hotims.com and enter 20 for product information.

    Untitled-4 1 1/20/15 12:04 PM

  • 4 0 2 1 5 | S E C U R I T Y P R O D U C T S

    www.security-today.comCONTENTS FEBRUARY 2015

    FEATURES

    Cloud Computing 14Taking the Mystery Out of Video-in-the-CloudWhy cloud storage is gaining popular supportBy Jennifer Bruce

    Emerging Technologies 223 Trends in Biometrics You Cant IgnoreMore reliable and efficient than ever beforeBy Jeremy Krinitt, Keven Marier and Brian Carle

    Transportation Security 38Bus Lanes Get MakeoverThe Rapid riders will have access to First RespondersBy Michael Zuidema

    Perimeter Security 40Mission PossibleFilling a huge security gap with an accountable security systemBy Nick Simon

    Security Software 42Firewall ProtectionVital information among the most coveted resourcesBy Patrick E. Craig

    Security Analytics 44Growing the Role of Analytics in Video SurveillanceAdding value to video surveillanceBy Charles McCready

    Utility Facility Security 46Protection Beyond FencesEarly warning detection and identification of threats inside and outside the fence lineBy Rodrick Cross

    SPECIAL SECTION

    Networking Security NS1-NS16

    PRODUCT SECTIONS

    Access Control 32

    DEPARTMENTS

    Industry Focus 8Setting SailBy Ralph C. Jensen

    Industry Vertical 10A Comprehensive SolutionThe importance of having a reliable video surveillance strategy at a marathonBy Sarah Colson

    Top Picks 12

    New Products 48

    Advertisers Index 57

    Industry Professional 58Plunging into the Security Industry By Ginger Hill

    Security Products (ISSN 1520-376X) is published monthly by 1105 Media Inc., 9201 Oakdale Ave., Ste. 101, Chatsworth, CA 91311. Periodicals postage paid at Chatsworth, CA 91311-9998, and at additional mailing offices. Complimentary subscriptions are sent to qualifying subscribers. Annual subscription rates payable in U.S. funds for non-qualified subscribers are: U.S. $119.00, International $189.00. Subscription inquiries, back issue requests, and address changes: Mail to: Secu-rity Products, P.O. Box 2166, Skokie, IL 60076-7866, email [email protected] or call (847)763-9688. POSTMASTER: Send address changes to Security Prod-ucts, P.O. Box 2166, Skokie, IL 60076-7866. Canada Publications Mail Agreement No: 40612608. Return Undeliverable Canadian Addresses to Circulation Dept. or XPO Returns: P.O. Box 201, Richmond Hill, ON L4B 4R5, Canada.

    Copyright 2015 by 1105 Media Inc. All rights reserved. Printed in the U.S.A. Reproductions in whole or part prohibited except by written permission. Mail requests to Permissions Editor, c/o Security Products, 14901 Quorum Dr, Ste. 425, Dallas, TX 75254

    The information in this magazine has not undergone any formal testing by 1105 Media Inc. and is distributed without any warranty expressed or implied. Imple-mentation or use of any information contained herein is the readers sole responsi-bility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry.

    0215sec_004_TOC_v1.indd 4 1/21/15 2:54 PM

  • Untitled-6 1 12/13/12 1:36 PM

    Go to http://sp.hotims.com and enter 15 for product information.

  • 6 0 2 1 5 | S E C U R I T Y P R O D U C T S

    Dont Forget to Enter the Govies

    Weve started accepting applications for our 2015 Govies awards. From now until March 13, com-panies can submit any number of products. With even more product categories to choose from this

    year, theres sure to be the perfect fit for every company interested in entering. Platinum and Gold winners will be announced in April, with awards being presented during the ISC West expo (April 15-17) in Las Vegas. If youd like to enter or have any questions regarding the Govies, feel free to contact me.

    Our REACTION blog addresses current events and receives great feedback from our active online community. Wed like to invite you to check out our recent posts and share your thoughts.

    If youre interested in contributing to our Online Exclusives or our blog, please contact me at [email protected] or 972-687-6784.

    Best Regards,

    Lindsay Page

    Online Exclusives

    A Layered Approach to Airport SecurityBy David LenotAirports face unique challenges, as they must en-sure the safety and security of the public and their employees without impacting travel times, especially during busy travel seasons and periods of volatile weather. Add to this the continued awareness of global events and the growing trend of publicly ac-cessible shopping areas, and we understand why air-port security is so vital. In order to mitigate incidents before they result in unnecessary delays, costly shut-downs, or threaten public safety, these environments require physical security systems that are capable of detecting events and reducing response times.

    10 Tips to Help Security Guards Stay Safe this WinterBy Chris TaylorAs a security guard, you work long and hard to keep people and their property safe. No matter where youre based a bustling shopping center, an office complex, or a private residence you hold a position of trust and responsibility. To perform at the best of your abilities, you need to combine your training and experience with the best equipment you can lay your hands on the safer you are, the safer your clients will be. With this in mind, weve put together ten tips to help you stay as secure on-duty this winter

    http://security-today.com/01131

    Recent Headlines

    A Canned Approach to School Security

    Military Tightens Security at Base in Delaware after Drivers Raise Suspicion

    Recap of White House Cybersecurity Efforts

    Military Tightens Password Security After Central Command Hack

    Security Services on High Alert for Beheading Attack in Britain

    Security Increased at U.S. Airports as Precaution

    http://security-today.com/news

    Upcoming Webinars

    ShellShock is a Vulnerability in a Bash Shell Commonly Found in Unix, Linux and OS X operating systems.During this webinar, we will provide the technical de-tails behind ShellShock vulnerability as well as how it is being exploited in the wild (along with telemetry data).

    Transportation Worker Identification Credential (TWIC): Leveraging TWICs Identity Management Mediocrity into Better Risk MitigationCaptain Mark Johnson, VP of Strategic Accounts at Eid Passport and a seasoned expert in maritime vul-nerability assessments, will discuss how maritime risk mitigation can be made more robust by using proven identity management solutions.

    Meeting the Challenge of Secure Visitor Management for Secure Government FacilitiesJoin us for this FREE webinar as we detail the rea-sons why an enterprise visitor management system is absolutely necessary in todays government facilities.

    To view these Webinars at any time, please visit http://security-today.com/webinars.

    REACTION Blog Recent Posts

    Gun Parenting Gone Wrong

    What the Security Industry Can Glean from the Peshawar Massacre

    Alleged Boston Marathon Bomber Emerges from Isolation

    Members of our staff and guest bloggers take advantage of REACTION to add their own perspectives on a broad range of security topics and issues. If youd like to be a contributor, please contact Group Social Media Editor, Ginger Hill at [email protected].

    Online Communities

    Follow us on Twitter: www.twitter.com/SecProds

    Become a fan on Facebook:http://www.facebook.com/secprodonline

    Pin with Us:http://pinterest.com/securitytoday/

    Go to sp.hotims.com and enter 32 for product information.

    0215sec_006_eTOC_v2.indd 6 1/21/15 4:39 PM

  • nounhaving or serving a utilitarian purpose; capable of serving the purpose for which it was designed.

    POE Powered

    IP Based Architecture

    RFID Support/Smart Cards

    Access Control/Door Strike Control

    Real Time Video Notifi cations to Smart Phones

    www.icrealtime.com866.997.9009

    The doorbell redefi ned.

    Go to http://sp.hotims.com and enter 17 for product information.

    Untitled-2 1 10/21/14 1:18 PM

  • INDUSTRYFOCUSBy Ralph C. Jensen, Editor-in-Chief

    8

    www.security-today.com

    Volume 19, No. 2

    EDITORIAL STAFF

    Editor-in-Chief/Associate Publisher Ralph C. Jensen

    Senior Editor Lindsay Page

    E-news Editor Brent Dirks

    Content Development Matt Holden

    ART STAFF

    Art Director Dale Chinn

    PRODUCTION STAFF

    Director, Print and Online Production David Seymour

    Production Coordinator Teresa Antonio

    EDITORIAL ADVISORY BOARD

    Thomas Carnevale, president/CEO, Sentry 360

    William Crews, President/CEO, Security & Resilience Consulting, LLC, Houston

    Merlin Guilbeau, Electronic Security Association, Irving, Texas

    Robert Hile, director of strategic accounts, Sure View Systems

    Alan T. Mather, NASA, Lyndon B. Johnson Space Center, Houston

    SALES

    Randy Easton 904-261-5584

    Brian Rendine 972-687-6761

    Sam Baird +44 1883 715 697

    Jane Dai +86-755-26289889

    Peter Kao +886-2-2949-6412

    SECURITY, SAFETY, AND HEALTH GROUP

    President & Group Publisher Kevin OGrady

    Group Circulation Director Margaret Perry

    Group Marketing Director Susan May

    Group Website Manager Scott Newhouse

    Group Webinar Administrator Tammy Renne

    Group Social Media Editor Ginger Hill

    Chief Executive Officer Rajeev Kapur

    Senior Vice President & Chief Financial Officer Richard Vitale

    Chief Operating Officer Henry Allain

    Executive Vice President Michael J. Valenti

    Vice President, Erik A. Lindgren Information Technology & Application Development

    Vice President, Event Operations David F. Myers

    Chairman of the Board Jeffrey S. Klein

    REACHING THE STAFF

    Staff may be reached via e-mail, telephone, fax or mail. A list of editors and contact information also is available online at www.security-today.com.

    E-mail: To e-mail any member of the staff, please use the following form: [email protected]

    Dallas Office (weekdays, 8:30 a.m. 5:30 p.m. CT) Telephone (972) 687-6700; Fax (972) 687-6799 14901 Quorum Dr., Suite 425, Dallas, TX 75254

    Corporate Office (weekdays, 8:30 a.m. 5:30 p.m. PT) Telephone (818) 814-5200; Fax (818) 734-1522 9201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311

    Setting SailI havent really given any thought to taking a cruise. I think it might be fun, and it certainly would be something different than Ive ever done before. I also havent given much thought to the challenges of maintaining security for thousands on a cruise ship.

    At the airport, as you are well aware, there is a certain structure in place to screen passengers. Like me, you might not even give this a second thought any longer. I love TSA PreScreening, which allows a per-son to zip through security. Without giving this much thought, I often wonder what TSA people find at the checkpoints.

    I was shocked.During the week of Dec. 18, 2014, TSA agents

    discovered 56 firearms. Of the 56 firearms found, 43 were loaded and 13 had rounds chambered. Thats at airports nationwide. Airports do have fairly strict screening procedures.

    Security in the cruise ship industry remains rela-tively soft, in comparison. This has changed in 2015. The Coast Guard expects to increase screening re-quirements for passengers and their baggage.

    Demand for cruising worldwide nearly doubled between 1999 and 2009, with the number of passen-gers increasing to 16.93 million from 8.59 million. In addition, vacationers are coming from an increasing range of national, racial, ethnic and religious groups.

    Cruise lines are also expanding their operations to new, remote and potentially dangerous areas, such as the Middle East, which experts say increases ships chances of dealing with foreign marine facilities whose security practices are not up to par.

    The Coast Guard will be taking all necessary steps for the security of passengers, said Jared Bickenbach, a market analyst for security and building technology at HIS Inc. There are massive amounts of people at any given time, and there have been, in the past, move-ment of extremists in the Mediterranean area of the world. The bottom line is, there have only been five at-tacks in the past 55 years, and this program will mostly affect U.S. passengers and baggage.

    The most recent assault occurred in 2004 when terrorists belonging to an Islamist separatist group bombed the SuperFerry 14 in Manila Bay, Philip-pines. The attack resulted in 116 deaths.

    In the United States, the Coast Guard has an-nounced its plans to standardize passenger security screening procedures at cruise ship terminals with the creation of the Terminal Screening Program. There are currently 137 regulated cruise ship terminals, op-erated by 23 U.S. cruise companies. The proposed regulations will not be mandatory, resulting in a pro-jected slow uptake over the short-term of new explo-

    sives, weapons and contraband detection equipment in the cruise ship industry.

    Cruise ship terminals currently use a combination of X-ray, people scanning, explosive detection systems, canine teams and manual inspections. According to an HIS published report, the explosives, weapons and contraband detection equipment market is expected to grow by 6.7 percent to $241.6 million in 2018.

    According to the website for Cruise Lines Inter-national Association Inc.the worlds largest cruise industry associationcruise passengers, crew and baggage must pass through a security checkpoint be-fore embarking or disembarking. Additionally, crew members must undergo pre-employment background screening. But the website does not specify whether screening methods vary by cruise line or not.

    Larger cruise ship terminals prefer efficiency and greater throughput by installing newer X-ray and EDS equipment. Smaller ship terminals will likely be slower in adopting EWC equipment, and will instead use canine teams as well as manual inspections.

    The Terminal Screening Program is expected to in-crease its security presence by developing a standard-ized list of prohibited items, develop training stan-dards to consolidate requirements for screeners, and eliminate redundancies in cruise ship security regula-tions. Dont be surprised if there is a requirement to screen all passenger, crew and visitors baggage and personal items.

    Terrorism threats to the cruising industry have been minimal, especially compared to aviation, and cruise ships are considered to be more resilient due to the large number of passenger aboard each ship. Industry analysts indicate that the cruising industry is more resilient than the aviation sector, which will re-sult in the development of specific screening require-ments for the cruise ship industry. Because there is a lower probability of a terrorist attack on a cruise ship, there is an expectation that screening requirements will be much less stringent at the terminals.

    Terrorism is event driven. Cruise ship terminals, like airports would have to act when and if an attack were to occur. This would undoubtedly lead to increased security screening regulations at cruise ship terminals.

    Cruise ship companies tend to be more reactive than proactive with security practices because they dont want to hurt business. Lets hope there is enough security intelligence given to the cruise ship industry to maintain a safe, secure and orderly business.

    0215sec_008_IndFocus_v2.indd 8 1/21/15 3:09 PM

  •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o to http://sp.hotims.com and enter 27 for product information.

    Untitled-4 1 1/14/15 11:47 AM

  • 1 0 0 2 1 5 | S E C U R I T Y P R O D U C T S

    The New York City marathon is hosted the first week of November with more than 2 million spectators, 50,000 runners, and thousands of staff and volunteers. When it came time to plan-ning the logistics for a successful event for the

    worlds largest marathon, safety and preventive actions were the most important criteria.

    In order to help deliver a safe and successful marathon, a comprehensive surveillance system needed to be installed through the five boroughs of New York City. Installing a tem-porary video surveillance system across a 26.2 miles course is no small feat. With no room for error, the chosen surveillance system needed be able to protect against potential threat and in-crease overall situational awareness.

    Seneca was chosen to provide the video surveillance hard-ware including the network video recorder and client viewing

    stations for recording and monitoring at the event. On a traditional install, contractors have months to

    plan, install, test, and commission all required commu-nication infrastructure. On a temporary system, all as-pects are truncated time-wise, with the installation time taking the biggest hit. One of the biggest challenges was providing a comprehensive system that was able to integrate multiple technologies without failure.

    The communication of the network video record-er, variety of different cameras, video management

    software, analytics software, networking, and cli-ent viewing stations had to work seamlessly with

    no downtime or room for failure. Ensuring that all of the components worked together

    seamlessly allowed officials to monitor any suspicious behav-

    ior and respond to prevent any harmful activities; ensuring the safety to the New York City area and the marathon.

    Project SolutionA range of different camera models were installed across mul-tiple buildings, street corners, temporary poles and traffic lights to provide coverage for the entire route of the marathon. All of those camera feeds were processed and stored on Senecas xVault NVR.

    With hundreds of video feeds streaming into the races com-mand center through commercial-grade monitors were con-trolled by Senecas xVault client viewing stations (xView), which allowed command staff to control and monitor tactical camera operation and video footage. The race command center showed dozens of cameras feeding real-time data to race staff, incident commanders, and law enforcement officials to increase the over-all situational awareness for the marathon. The monitoring center allowed staff members and law enforcement to observe the progress of the race from beginning to end. This solution contributed to the New York City Marathon goals to increase situational awareness and provide preventive action as needed for suspicious events.

    The volume of runners and spectators increased through the park throughout the day which only meant that the video sur-veillance solution had to work harder. In order to provide cover-age across the entire length of the marathon, the solution needed to have the ability to actively monitor all activity through the use of advanced video analytics. From time to time during the marathon, live video was pushed from smart phones to the race command center to view activities in more detail. This way the New York City Marathon surveillance staff was able to capture video footage by the senior staffs mobile camera. This allowed

    A Comprehensive SolutionThe importance of having a reliable video surveillance strategy at a marathonBy Sarah Colson

    Sarah Colson is in charge of marketing, digital security and surveillance at Seneca.

    0215sec_010_011_IndVert_v2.indd 10 1/21/15 3:11 PM

  • W W W . S E C U R I T Y - T O D A Y. C O M 1 1

    coverage in areas that surveillance cam-eras may not have been able to capture, increasing the overall safety and situ-ational awareness for the marathon.

    Having the ability to push live video into the field allows security per-sonnel to fully understand, monitor, and react accordingly to each potential security threat, said Toby Heath, busi-ness development manager at Seneca.

    Outcome and Benefits RealizedSenecas surveillance solution of xVault network video recorders and client viewing stations that were deployed at the New York City Marathon played a major role in helping to ensure the safety and security of the entire event. A reliable video surveillance recording platform and high-resolution viewing stations that accurately portray the live/recorded images are two key aspects to any effective video surveillance system. Without these two items, all other com-ponents bring little value.

    The ability to actively monitor all activity and live video feeds through the command center was one of the most important actives in order to ensure safety for the entire community. Us-ing Senecas client viewing solution the races command team was able to effec-tively monitor all activity and respond accordingly. The command team con-sisted of local, state, and federal offi-cials who utilized the video surveillance solution to monitor all activities and re-spond appropriately to any events that occurred throughout the day.

    The command center team was able increase situational awareness through-out the day with a wide range of activi-ties. These activities allowed the team to provide surveillance monitoring to a larger area without having to increase manpower. This strategy started with the items that the New York City Mara-thon allowed runners to carry into the race, excluding any items that could cause any harm and/or alarm anyone involved in the race. The command cen-ter was very thorough with the process of monitoring the video feeds, obtain-ing necessary information, and dissemi-nating information about any potential threats. Finally, situational awareness was enhanced through the use of social media. The New York City Marathon promoted using social media to post suspicious person or behavior through media outlets such as Twitter, Face-book and Instagram.

    The strategy executed throughout the race provided the tools necessary to im-

    prove the command center teams ability to make well-informed decisions in real time to ensure safety for the race and community. The ability to have features to zoom-in on suspicious objects and activities improved overall efficiency in deploying security enforcement officers. One of the most valuable tools for this success is the ability to push video/pho-

    tos to all security/safety personnel of suspicious persons, objects or vehicles.

    Seneca was pleased to be able to provide the solution for the New York City Marathon for a safe and secure event without any incidents, said Ron VanTassel, market development man-ager, Seneca.

    The success of this New York City

    Marathon demonstrates the impor-tance of having a well thought out surveillance strategy for large public events. The surveillance strategy for the marathon covered every aspect from the proper positioning of surveillance equipment, and security personnel to the communication of increased sur-veillance measures to the public.

    This solution is

    available directly from

    DM Network Video

    Effective early FIRE DETECTION for high value assets

    Theres more to Dedicated Micros...

    ask about our IP network video solutionsCal l 1-877-367-8778 or v is i t

    www.dm-networkvideo.com

    Copyright AD Group 13th October 2014

    FireVu Visual Smoke Detection (VSD) reliably detects smokeand ame at source and enables a fast, speci c response.

    A solution that provides early detection of ame and smoke anywhere within the visual eld both inside and out.

    Live and recorded video helps to direct re protection professionals when danger arises and enables forensic analysis.

    Absolute temperature sensing, VSD and ame detection combined in new multi-detector. Detect and differentiate between combustible and normally high temperature and visually verify.

    Monitoring and visual veri cation of a re that can be conducted equally effectively on-site or remotely.

    Fully tailored masking and zoned detection screens out unwanted areas of view and enables double knock detection.

    A re detection solution managed from a single GUI alongside NetVu Connected security video.

    FireVu has successfully been used to protect demanding industries including: high value property, petrochemicals facilities,manufacturing and food processing plants, air hangars, tunnels, recycling and waste management sites.

    Untitled-9 1 11/3/14 4:58 PMGo to sp.hotims.com and enter 36 for product information.

    0215sec_010_011_IndVert_v2.indd 11 1/21/15 2:55 PM

  • 0215 TOP PICKSCompiled by Security Products Staff

    1 2 0 2 1 5 | S E C U R I T Y P R O D U C T S

    IrisID SystemsIrisAccess 7000

    TheIrisIDSystemsIrisAccess7000seriesisadualirisrecognitioncameracapableofsecur-ingairports,datacentersandmanycriticalin-frastructurepoints.

    The biometric camera offers a multi-factorverification solution, and can interface withmostaccesspanelsandperipheralsviaWie-gandorTCP/IP.

    Optionalbuilt-inHIDreaders,touchscreenLCDkeypads and software tools offer increasedflexibility.

    Thecameracanverifyidentificationinsecondsfrom14inchesaway.Availableoptionsfortheproductincludevoiceandvideofeedback.

    IrisID Systems.Go to sp.hotims.com and enter 314 for product information.

    MorphoTrakMorpho 3D Face Reader

    The Morpho 3D Face Reader provides light-ning-speed,hands-freeaccesstoofficesandrestrictedareas.

    By analyzing the three-dimensional struc-ture of the users face, the reader achievesextremely accurate matching while ensuringhighthroughput.

    The projectors invisible near-infrared lightpattern is projectedonto theusers faceandthecameracapturesthedistortedlightpatternandinterpretsitfor3Dfacialbiometricmatch-ing.WiththeMorpho3DFaceReader,accesscontrol is highly secure and as simple as aquickglance.

    MorphoTrak.Go to sp.hotims.com and enter 315 for product information.

    Precise BiometricsTactivo

    TheTactivoProductSuite ofSmartCardandFingerprint Reader Solutions is an innovativesmart casing product for tablets and smart-phonesthatincludesanembeddedfingerprintandsmartcardreader.

    Togetherwithagrowingnumberofapps,Tac-tivoenables smart cardsandfingerprintbio-metricstobeusedoniPhoneoriPaddevicesforsecurebrowsingandmessaging.

    Tactivo enables companies and governmentagencies tomaintain a high-level of authen-tication and security when employees usemobile devices, protecting the network andenterprisesystems,aswellasappsthatmaystoresensitivedataonthedevice.

    Precise Biometrics. Go to sp.hotims.com and enter

    316 for product information.

    ZwipeBiometric Card

    Zwipesnext-generationbiometriccard,acon-tactless smart card credential with on-cardfingerprint reading, quickly reads the usersfingerprintinlessthanasecond.

    Eliminating the problems of solely deploy-ingPINsand standardcards, the contactlessZwipe biometric card lets users authenticatethemselvesdirectlyonthecardthroughsome-thingtheyare,afingerprint.

    Onlyafterafingerprintisverified,willthecardsystemactivatethelock.

    Zwipe. Go to sp.hotims.com and enter

    317 for product information.

    LumidigmM-Series

    Lumidigms M-Series fingerprint reader ex-tends the reliable reading accuracy ofmulti-spectralimagingbyreadingbothsurfaceandsubsurface fingerprints in hot, cold, wet, dryanddirtyconditions.

    M-Seriessensorsmakebiometricauthentica-tion simple and affordable for real businessapplications in industriessuchashealthcare,logistics,heavyindustryandconstruction.

    Producingacleanreadonthefirstattempt,theM-Seriesreaderquicklyandeasilydeliversahigh-qualityfingerprinttoWindowsPCforau-thentication.

    Lumidigm.Go to sp.hotims.com and enter 310 for product information.

    Open OptionsDNA Fusion

    OpenOptionsDNAFusionaccesscontrolsoft-warehasaddedmorefeaturestotheversatileWebclient.

    Inadditiontovideointegrationandtheabilityto capture photos, theDNAFusionWeb v2.5offersenhancedsmartcardmodifications.

    New modifications for the software includemagnetic stripe encoding, ID badging, Prox/iCLASSenrollment, and biometric card enroll-mentforSchlageHandkey2andBioscrypt4Gfingerprintreaders.

    Open Options. Go to sp.hotims.com and enter

    311 for product information.

    3M Congent Inc.MiY-Touch

    TheMiY-Touchindoorbiometrictouch-screenaccess control reader is compact, fast, andoneofthelightestreadersinitsclass.

    Designedwithanintuitiveinterfaceandvisualuser feedback, the reader iseasyand fun touse. MiY-Touch has several features includ-ing built-in time and attendance functions,externalUSBforadd-ondevices,SandboxAPIframeworksupport.

    An optional detachable contact/contactlesssmart card readermeets current SP800-116standards.

    3M Cogent Inc. Go to sp.hotims.com and enter

    312 for product information.

    Watchful SoftwareTypeWATCH

    WatchfulSoftwaresTypeWATCHisasoftware-onlye-Biometricsolutionrequiringnohardware.

    The solution continuouslymonitors for intru-sionattemptsbyanalyzingfreetexttypingpat-ternsofeachuser.

    Thesolutionprovidespersistentsecuritypost-login and secures the entire user session inrealtime.

    If an intruder is detected, TypeWATCH auto-matically applies defined security policies,suchaschallengepasswords,notificationandlockout,withaforensicaudittrailforcompli-ancepurposes.

    Watchful Software. Go to sp.hotims.com and enter

    313 for product information.

    0215sec_012_Toppicks_v3.indd 12 1/21/15 2:57 PM

  • HHHHHHHHHHHHHHSSSSSSSSSSSSSS HHHHHHHHHHHHHHyyyyyyyyyybbbbbbbbbbbbbbrrrrrrrrrriiiiiiiiiiiiiidddddddddddddd DDDDDDDDDDDDDDVVVVVVVVVVVVVVRRRRRRRRRRRRRR

    t 5SVF)ZCSJE%73BUUIFDPTUPGBOBOBMPHSFDPSEFSt 1MVHQMBZGFBUVSFXJUI4QFDPT*1DBNFSBT t %VBMOFUXPSLQPSUTGPSJTPMBUJOH*1DBNFSBOFUXPSLBOESFNPUFOFUXPSLUSBDt 6QUP.1SFTPMVUJPOPOUIFMBTUDIBOOFM3BUUIFDPTUPGBOBOBMPHSFDPSEFSUVSFXJUI4QFDPT*1DBNFSBT t %VBMOFUXPSLQPSUTGPSJTPMBUJOH*1DBNFSBOFUXPSLBOESFNPt 6QUP.1SFTPMVUJPOPOUIFMBTUDIBOOFM3FBSQBOFMD8HS$IBOOFM*1"OBMPH)ZCSJE%73D16HS$IBOOFM*1"OBMPH)ZCSJE%73

    For our full line of 960H and IP products visit TBMFT!TQFDPUFDIDPNTQFDPUFDIDPN

    All channels fully configurable for either 1080p or 960H!

    i*OUFOTJmFS*1)%.FHBQJYFM*OEPPS0VUEPPS7BOEBM3FTJTUBOU%PNF*1$BNFSBNNBVUPJSJTWBSJGPDBMMFOT i*OUFOTJmFS*1)%.FHBQJYFM*OEPPS0VUEPPS.JOJBUVSF%PNF*1$BNFSBNN'JYFEMFOT

    EZ Set-Up Wizards:0OFDMJDLXJ[BSEHVJEFTTZTUFNTFUVQJOBMPHJDBMBOEFBTZUPVOEFSTUBOETFRVFODF%BUF5JNF3FDPSEJOHNFUIPE3FDPSEJOHWJEFPRVBMJUZ/FUXPSL1PSUGPSXBSEJOHEZ Camera:RVJDLMZEJTDPWFSTBOEJOTUBMMT4QFDP*1DBNFSBTEZ Search:TFBSDIFWFOUTGSPNUIVNCOBJMTfind it fast!EZ Record: RVJDLMZTFUVQSFDPSEJOHSFTPMVUJPOTBOESFDPSEJOHUZQFEZ Copy:BVUPDPQZXIBUZPVBSFQMBZJOHPOUPB64#nBTIESJWF

    OOiMDD1*OUFOTJmFS*1)%.FHBQJYFM*OEPPS0VUEPPS.JOJBUVSF%PNF*1$BNFSBNN'JYFEMFOTOOiDD4*OUFOTJmFS*1)%.FHBQJYFM*OEPPS0VUEPPS7BOEBM3FTJTUBOU%PNF*1$BNFSBNNBVUPJSJTWBSJGPDBMMFOTHHT599400H57-*OEPPS0VUEPPS*3.JOJBUVSF%PNF$BNFSBNNBVUPJSJTWBSJGPDBMMFOT HTTINT59KK*OUFOTJmFS,57-*OEPPS0VUEPPS7BOEBM3FTJTUBOU%PNFXJUI5SVF8%3NNBVUPJSJTWBSJGPDBMMFOT79/

    Perfectly paired with Speco Technologies cameras See Color at Night without IRs

    Go to http://sp.hotims.com and enter 25 for product information.

    Untitled-4 1 1/14/15 11:42 AM

  • TAKING THE MYSTERY OUT OF VIDEO-IN-THE-CLOUDWhy cloud storage is gaining popular supportBy Jennifer Bruce

    In a recent Hollywood comedy, Jason Segels character uttered the famous line, Nobody understands the cloud. Its a mystery. And yet, all of us have been using the cloud for years: for online banking, online shopping, social media, email, sharing family photos and a host of other activities.

    Now, the security industry is talking about video in the cloud. People are struggling to wrap their heads around the concept. So, lets take some of the mystery out of this new operating model and explain why it can be a better alternative for many end users. Then we can address some of the major concerns customers might have regarding the technology, how some businesses are already using this cloud service and how managed cloud services as a whole are continuing to evolve.

    VIDEO-IN-THE-CLOUD ISNT ALL THAT MYSTERIOUSSimply put, the cloud is a centralized storage of information. The location is com-monly a highly secure data center operated by a third party as a subscription ser-vice and is virtually accessible from anywhere. Multiple companies share the real estate of that storage facility instead of maintaining their own in-house storage. But each company is provided with a unique web portal that only allows them ac-cess to their own information.

    The format of the data can be anything from documents to photos to video footage.

    In the security world, storing video in the cloud is often referred to as hosted video or video-as-a-service (VaaS). But, its really the same concept. In the video

    CLOUD COMPUTING

    1 4 0 2 1 5 | S E C U R I T Y P R O D U C T S

    0215sec_014_020_Bruce_v3.indd 14 1/21/15 4:40 PM

  • Bright Idea6MP Real-time VideoWith up to 6 megapixel resolution (3072 x 2048) recording at 30fps, Smart IP cameras oer unparalleled image quality and a real-time surveillance experience

    Smart FeaturesLine Crossing DetectionDetect objects, people and vehicles crossing a dened virtual line An ideal solution for monitoring building entrances, parking lots and otherrestricted areas

    Innovative Hikvision Smart IP cameras bring intelligence, eciency and convenience to modern video surveillance. Enriched with Smart technologies, Hikvision's new Smart IP cameras, Smart PTZ cameras and Smart NVRs are all meticulously designed to deliver smart security for a broad variety of applications. Now thats a Bright Idea!

    www.hikvision.comTel: +1 909.895.0400

    Email: [email protected]

    Hikvision USA Inc.

    Go to http://sp.hotims.com and enter 28 for product information.

    Untitled-4 1 1/20/15 11:52 AM

  • 1 6 0 2 1 5 | S E C U R I T Y P R O D U C T S

    CLOUD COMPUTING

    surveillance world, instead of the traditional operat-ing model of storing footage on site in DVRs, NVRs or sometimes even a VMS, you stream the video to a third-party data center for archiving. Accessibility from anywhere is the key.

    DVRs, NVRs and VMS-based video surveillance systems tend to be relatively closed systems. You might be able to view the live video or access archived footage from an authorized corporate computer, but unless youve downloaded all the proprietary appli-cations onto your remote viewing devicemobile phone, tablet, laptop or PCyou wont be able to ex-perience the systems full feature set.

    VIDEO-IN-THE-CLOUD HAS SOME SIGNIFICANT ADVANTAGESCloud stored video turns out to be the most feasible option for enabling end users to securely access their video no matter where they happen to bewhether at the office, at home, on the road, or even on vacation. They simply log onto the web-based, secure portal for their business and everything is there at their finger-tips. The underlying applications that make it all work seamlessly reside in the cloud, not on their device. So they dont have to worry about software updates or any other programming issues. Those are all managed and maintained by the service provider.

    While accessibility is a hot topic, so is cost. With cloud storage, customers significantly lower their up-front capital investment. Video in the cloud eliminates the need for on-site storage (unless you want to main-tain redundancy for the rare occasions when Internet connectivity might be disrupted). So no more worries about failure-prone DVRs. No mega-terabytes of server storage to purchase, find space for and main-tain. With a subscription service, the only things the customer pays for upfront are the network cameras and an Internet connection.

    The cost of running the system comes out of the monthly operating budget. And the nice thing about a subscription, you only need to purchase the band-width and cloud storage you actually need at the time you need it. This set up makes it easier to keep the system nimble and expandable at a customers own determined pace. The service provider handles sys-tem updates and upgrades, integrates new features, troubleshoots and performs regular maintenance rather than placing the burden on the customer who may not have the technical expertise in-house to do those tasks.

    Another significant advantage of offloading video to the cloud is security. How often have we heard of intruders, or even untrustworthy employees, tamper-ing with or stealing surveillance footage that has been stored on site? Video in the cloud mitigates the risk of losing this valuable forensic evidence.

    CLEARING UP SOME MISCONCEPTIONSDespite the obvious advantages of video-in-the-cloud, many potential customers point to serious

    concerns about security, bandwidth consumption, and the complexity of deploying this type of solution. Lets examine those concerns one at a time.

    Security. In light of all the recent WikiLeaks, You-Tube exposs and hacking of retail giants customer data, you might be wondering, Just how secure is video-in-the-cloud? Giving ones sensitive video data into the safekeeping of a third party requires enor-mous trust. Even though users have been entrusting the transmission of their private financial data, busi-ness correspondence and other confidential informa-tion to third parties for years, its still reasonable to want to know what security measures are being put in place to protect their video data from unauthorized access and exploitation.

    Generally there are three levels of security used to mitigate risks in a cloud environment: at the data storage facility, in the pipeline, and at the network camera. A certified cloud storage facility maintains the highest classification of data center security by complying with numerous regulations and industry guidelines, including SAS70, RSA Encryption and ISO 270001 audits. This translates into selecting pre-mium bandwidth providers to ensure minimal latency and fast connectivity to all points of the global In-ternet. It also includes extensive fault tolerance and resilience at every layer to ensure consistent, uninter-rupted power supply to the facility.

    They employ extra safeguards to keep your video secure such as multi-level passwords, SSL encryption, virtual private networks (VPN) and firewalls. They use authentication codes to restrict camera and lo-cal storage communication to their specific hosting cloud. As an additional precaution, they might also operate multiple data centers to ensure geographic re-dundancy in case of a disaster.

    There are a number of encryption methodologies that can be used to protect the video data as it flows through the pipeline. Two of the most common meth-ods are symmetric and asymmetric. In the symmetric method, also known as private-key cryptography, the video data is encrypted at the senders end with a key and the receiver uses the same key to decrypt the data at the other end. On the other hand, an asymmetric method, also known as public-key cryptography, uses two different keysa public one for encryption and a private one for decryption.

    Most network cameras today come with vandal and tampering protection and firmware security fea-tures. But for additional security, they also support 802.1x port authentication and IP address filtering to prevent intruders from hijacking the video stream or penetrating the network. Todays network cameras can add a digital watermark and time stamping to all recorded material to mitigate image tampering. And they maintain access logs, creating an audit trail of who has seen what images and whether theyve made any edits to those recordings.

    Bandwidth. Another misconception is that sending video to the cloud monopolizes bandwidth needed for

    Go to sp.hotims.com and enter 33 for product information.

    0215sec_014_020_Bruce_v3.indd 16 1/21/15 4:40 PM

  • Much more than meets the eye. Imagine IP cameras that prevent backlight, low light, camera shake or fast action from spoiling or making you miss a crucial shot. That thinking is the soul of Sonys IPELA ENGINE platform and it made possible our most advanced W, V, E, X and C Series IP cameras. Conquer intense backlight with Sonys View-DR technology, which gets up to 130 dB dynamic range at Full HD. Overcome low light with Sonys XDNR noise reduction. Subdue camera shake with built-in image stabilization. And track fast action with up to 60 frames per second. Sonys IPELA ENGINE cameras dont just improve your vision. They extend your reach.

    Learn the Five Essentials of Surveillance Cameras at sony.com/security.

    2015 Sony Electronics Inc. All rights reserved. Reproduction in whole or in part without written permission is prohibited. Features and specifications are subject to change without notice. Sony, IPELA ENGINE, View-DR and XDNR are trademarks of Sony.

    Go to http://sp.hotims.com and enter 10 for product information.

    Untitled-17 1 1/7/15 3:02 PM

  • CLOUD COMPUTING

    1 8 0 2 1 5 | S E C U R I T Y P R O D U C T S

    other data communication traffic. But the beauty of most network video cam-eras is that their frame rates and resolu-tion can be adjusted to accommodate the available bandwidth. Furthermore,

    with advanced H.264 compression the amount of data flowing through the pipeline can be reduced by more than half while maintaining excellent image quality for playback.

    Another alternative is multi-stream-ingstoring lower resolution, lower frame rate images in the cloud and higher-resolution, higher frame rate images on an SD card in the camera

    or on a local network attached stor-age (NAS) device. This minimizes the issue of limited bandwidth and pro-vides redundancy. The other important thing to note is that every year technol-ogy pushes the envelope further, mak-ing greater bandwidth capacity more available and more cost-effective than before. These advances are gradually making it more affordable for smaller businesses to push great volumes of video data through the pipeline.

    Complexity. Using network cam-eras and streaming images to the cloud doesnt mean users have to be experts in networking technology. After all, how much does someone need to know about IT infrastructure to use e-mail or a shared printer? If anything, video-in-the-cloud simplifies the surveillance process. Nowadays, integrators can preprogram many IP-based cameras before installation so that as soon as theyre connected to the network they will automatically stream the video to the appropriate cloud-based storage. This removes the complexity of port forwarding and assigning static IP ad-dresses that is typically necessary for more traditional in-house enterprise-wide surveillance systems.

    WHERE VIDEO-IN-THE-CLOUD IS GAINING A FOOTHOLDBecause of the technologys inherent flexibility, users of video-in-the-cloud are quite a diverse population from large and mid-size corporations to small one-office businesses and repre-sentative of a wide variety of industry sectors. The following are just a few typical examples.

    Large retail chains. Using a video-in-the-cloud surveillance model at each retail outlet provides the corporation with a means to centrally oversee the entire operation and leverage the ag-gregate information to improve each individual location.

    Regional directors can remotely view video from all the stores in their sector through a single portal and compare performances, identify serial shoplifters, more tightly manage staff-ing resources, even monitor displays to ensure each store aligns with corpo-rate standards for particular marketing campaigns.

    Video-as-a-service can prove far less costly than scheduling regular onsite

    'LVWULEXWHGE\

    North American Cable Equipment Inc.www.northamericancable.com

    EVS UNITES ALL OF YOUR CCTV TECHNOLOGIES

    ON ONE PLATFORMThe HD-COAXINATOR seriesof recorders and camerasdeliver HD video over coaxialcable with simple installation.

    * Additional hardware may be required for some applications

    Let Eye View Smart video analytics software from SecurityTronix be your hub for CCTVmanagement. EVS supports video streams from most major IP, analog, HD-SDI andHD-COAXINATOR cameras, ready to plug and play.

    SecurityTronix IP Camerasand thousands ofother IP cameras

    SecurityTronix analogcameras and virtually

    ALL other analog cameras

    Access RTSP streams fromHD-SDI, HD-CVI and manyother HD and SDDVRs

    Additional hardware inputsallow connection to

    commonly avaliablealarm hardware

    Native POS integration is ideal forretail sales environments

    Untitled-3 1 1/20/15 4:18 PM

    Go to sp.hotims.com and enter 22 for product information.

    0215sec_014_020_Bruce_v3.indd 18 1/21/15 4:40 PM

  • Go to http://sp.hotims.com and enter 3 for product information.

    Untitled-17 1 1/7/15 2:56 PM

  • CLOUD COMPUTING

    2 0 0 2 1 5 | S E C U R I T Y P R O D U C T S

    visits to each store and provides more timely feedback on problems that if left unchecked could quickly erode the bot-tom line. With additional analytics such as heat mapping and dwell-time analy-

    sis, management can learn to optimize floor plans and displays to attract shop-pers and convert browsers to buyers.

    Remote branches of a financial insti-tution. Many institutions with low cam-

    era count branch offices that originally opted for standalone, DVR-based sys-tems at those locations are now turning to cloud storage as a better operational model. Instead of constricted by the

    port capacity of a DVR, a cloud-based solution lets them add cameras cost-efficiently, one at a time, as needed.

    More importantly, hosted video gives managementlocal branch managers, district and regional man-agers, and corporate executivesre-mote access to live and recorded video at each site to analyze ways to improve and grow the business and the corpo-rate brand.

    A small professional services office. A hosted video model allows a one-per-son operation to leverage sophisticated video surveillance technology without a lot of costly hardware and onsite maintenance responsibilities. Remote access from anywhere means the small business owner can monitor events at the office while at home or even on va-cation. They can see whether the after-hours cleaning crew is doing a good job or stealing supplies.

    They can check if the plow service has cleared the sidewalk and parking lot before they head to the office. And should an incident occur while they arent onsite, they can log into the sys-tem remotely for video verification of events to avoid costly penalties for call-ing in a false alarm.

    THE FUTURE OF MANAGED SERVICES IN THE CLOUDWere already starting to see a gradual shift in cloud video services towards integration with other cloud-managed physical security systems. Linking multiple managed services under one umbrella allows user to access all their physical security data through a single sign-on experience.

    This might include everything from surveillance video to access control logs to thermostat sensors and more. With many jurisdictions now requiring video verification of alarms before deploying responders, an integrated approach to managed services in the cloud could be-come the mandate for business opera-tions in the future.

    Jennifer Bruce is a business development manager for hosted video for Axis Com-munications.

    The Game-Changing IDIS DirectIP Surveillance Solution Debuts at ISC West in April 2015.

    Visit IDIS at ISC West (Booth #11053) in Las Vegas, April 15-17 and learn more at idisglobal.com/gamechanger

    Untitled-2 1 1/14/15 11:02 AM

    Go to sp.hotims.com and enter 12 for product information.

    0215sec_014_020_Bruce_v3.indd 20 1/21/15 4:40 PM

  • 0DQDJHLW$OO)URP$Q\ZKHUH',*,23(OHPHQWV9LGHR0DQJHPHQWVROXWLRQDOORZVFXVWRPHUVWRYLHZWKHLU906VHUYHUVUHPRWHO\IURPDQ\ZKHUHWKH\KDYHDFFHVVWRWKHLQWHUQHW0DQDJHPXOWLSOHVLWHVVHDPOHVVO\VHWWLQJXVHUSHUPLVVLRQVFDPHUDVHWWLQJVUHFRUGLQJSUHIHUHQFHVDQGUXOHVDFURVV\RXUHQWHUSULVH8WLOL]LQJ',*,23(OHPHQWVFORXGKRVWLQJDOORZVIRUIDLORYHUSURWHFWLRQLID906VHUYHUJRHVGRZQXQH[SHFWHGO\JHWWLQJ\RXXSDQGUXQQLQJDJDLQLQQRWLPH

    Go to http://sp.hotims.com and enter 18 for product information.

    Untitled-3 1 1/14/15 11:38 AM

  • Broadly speaking, 2014 was a year full of exciting technological in-novations, and 2015 shouldnt be any different. If anything, well see further and accelerated improvements in all things technology. When looking specifically at the biometrics industry, there are a lot of great things going on as well. Indeed, if its been only a year

    since you last evaluated or used a biometrics solution, youre probably already out of touch with how far this technology has continued to mature.

    MORE RELIABLE AND EFFECTIVE THAN EVERTodays newest biometrics solutions have improved in overall effectiveness. In the past, users could have experienced trouble with bad reads from biometric devices. Unfortunately, plenty of users have a story about locking the CEO out of their office with a new biometric solution. All too often, users would place their finger on a reader and wait as the clock ticks by for a read to occur, only to have it fail. Today, the time it takes for a read to occur and the ability to accurately read a fin-gerprint have improved greatly, nearly eliminating bad reads.

    Also, many biometric devices are used in environments where the day-to-day users have dirt on their hands. Another big improvement is the ability for todays readers to deal with dirt and other conditions that are adverse to good fingerprint reads. Todays readers that collect grime are better able deal with it.

    Additionally, it used to be pretty easy to spoof a finger and fool a biometric fingerprint reader. Todays fingerprint readers are much better at recognizing a real

    finger versus an attempted spoof.Not to be overlooked is the fact that todays devices are more pleasing to the

    eye. Rather than looking like clunky machines built in the 1970s, many designs have improved to make the devices more aesthetically pleasing so they fit seam-lessly in the environments in which theyre installed.

    FAR-REACHING IMPLICATIONSThe second big trend in biometrics is vastly improved integrations. Many users have a bad taste in their mouth because of poor experiences that were a direct re-sult of a less-than-perfect integration. Because tighter integrations are now taking place, users can experience fantastic improvements with what occurs between bio-metric devices and their access control platform. For example, one improvement is enhanced visibility with whats happening at the biometric device. This could be as simple as seeing if the device is online or not. With most integration, you wouldnt know if there was a power or stability issue unless someone reported it.

    Additionally, many existing biometric integrations have biometric events com-ing through looking like a card read. The ability to differentiate whats actually happening with the device and a user now exists. Which finger did the user use? Was multifactor being used? Typically, when it comes to biometrics and multifac-tor, you dont have visibility into what was used to access, or attempt to access, a door. Also, you cant see if a device has been tampered with.

    Now theres also the ability to provide feedback to the user. For instance, you

    EMERGING TECHNOLOGIES

    2 2 0 2 1 5 | S E C U R I T Y P R O D U C T S

    3 TRENDS IN BIOMETRICS YOU CANT IGNOREMore reliable and efficient than ever beforeBy Jeremy Krinitt

    0215sec_022_030_KrinittMarierCarle_v3.indd 22 1/21/15 4:41 PM

  • February 2015www.security-today.com

    NETWORKINGNETWORKINGNETWORKINGNETWORKINGNETWORKINGNETWORKING SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY SECURITY

    ACTIONABLE INTELLIGENCE

    Data is the main player in making security decisions

    NS6

    ON THE FAST TRACKData has been with man since the dawn of time

    NS8

    A Special Section to Security Products

    COMPLETELY ON LINEWhy they are essential to the networking mission

    NS14

    0215nws_ns01_v4.indd 1 1/7/15 10:31 AM

  • EDITORIAL STAFFEditor-in-Chief/Associate Publisher Ralph C. JensenSenior Editor Lindsay PageE-news Editor Brent Dirks

    ART STAFFArt Director Dale Chinn

    PRODUCTION STAFFDirector, Print and Online Production David SeymourProduction Coordinator Teresa Antonio

    EDITORIAL ADVISORY BOARDSteve Collen, Cisco Physical Security, San Jose, Calif.Charlie Howell, Division 28 Consulting, San Antonio, TexasJeff Lemoine, General Mills, Minneapolis, Minn.Fredrik Nilsson, Axis Communications, Chelmsford, Mass.Dick OLeary, EMC, Hopkinton, Mass.

    SALESSam Baird +44 1883 715 697Randy Easton 904-261-5584Brian Rendine 972-687-6761

    SECURITY, SAFETY, AND HEALTH GROUPPresident & Group Publisher Kevin OGrady Group Circulation Director Margaret PerryGroup Marketing Director Susan MayGroup Website Manager Scott NewhouseGroup Webinar Administrator Tammy RenneGroup Social Media Editor Ginger Hill

    Chief Executive Officer Rajeev Kapur

    Senior Vice President & Chief Financial Officer Richard Vitale

    Chief Operating Officer Henry Allain

    Executive Vice President Michael J. Valenti

    Vice President, Information Technology & Application Development Erik A. Lindgren

    Vice President, Event Operations David F. Myers

    Chairman of the Board Jeffrey S. Klein

    REACHING THE STAFF Staff may be reached via email, telephone, fax or mail. A list of editors and contact information also is available online at www.security-today.com.E-mail: To e-mail any member of the staff, please use the following form: [email protected]

    Dallas Office (weekdays, 8:30 a.m. 5:30 p.m. CT) Telephone (972) 687-6700; Fax (972) 687-6799 14901 Quorum Dr., Suite 425, Dallas, TX 75254

    Corporate Office (weekdays, 8:30 a.m. 5:30 p.m. PT) Telephone (818) 814-5200; Fax (818) 734-1522 9201 Oakdale Avenue, Suite 101, Chatsworth, CA 91311

    Copyright 2015, all rights reserved. Networking Security is a supplement to Security Products, an 1105 Media Inc. publication, and is published four times a year: February, May, August, and November.

    The information in this magazine has not undergone any formal testing by 1105 Media Inc. and is distributed without any warranty expressed or implied. Implementation or use of any information contained herein is the readers sole responsibility. While the information has been reviewed for accuracy, there is no guarantee that the same or similar results may be achieved in all environments. Technical inaccuracies may result from printing errors and/or new developments in the industry.

    Networking Security welcomes vendor information and briefings. To arrange a briefing, please contact our editor-in-chief, Ralph C. Jensen, via email at [email protected]. Our agreement to accept or review product material or backgrounders is not a guarantee of publication.

    www.security-today.com February 2015 | Volume 9, No. 1

    NS2 0 2 1 5 | N E T W O R K I N G S E C U R I T Y

    NETWORKING SECURITYNETWORKING SECURITYNETWORKING SECURITYWhere IT Security and Physical Security ConvergeWhere IT Security and Physical Security ConvergeWhere IT Security and Physical Security ConvergeWhere IT Security and Physical Security ConvergeWhere IT Security and Physical Security ConvergeWhere IT Security and Physical Security Converge

    Features

    NS6 Security Technology ACTIONABLE INTELLIGENCEData is the main player in making security decisionsBy Ajay Jain

    NS8 Integrated SystemsON THE FAST TRACKData has been with man since the dawn of timeBy Brian McIlravey

    NS10 Networking Solutions ON THE EDGE OF INNOVATIONIP video surveillance market solutions building strong industry partnershipsBy Nicole Segura

    Departments

    NS4Enterby Ralph C. Jensen

    Data As a Decision Maker

    NS14Exitby Bud Broomhead

    Completely OnlineWhy they are essential to the networking mission

    0215nws_ns02_TOC_v1.indd 2 1/7/15 10:37 AM

  • OPTIMIZED CERTIFIED GUARANTEED

    For exclusive pre-launch announcements visit info.senecadata.com/xconnect

    Seneca | 7401 Round Pond Road | N. Syracuse, NY 13212 | p: 877.814.0348 | www.xvaultsecurity.com

    COMING SOON

    03 06 15

    Go to http://sp.hotims.com and enter 202 for product information.

    Untitled-2 1 1/6/15 2:06 PM

  • ENTERBy Ralph C. Jensen

    NS4

    DATA AS A DECISIONMAKERThe best way to make any decision is by col-lecting as much data as possible. The more information you have, the better your decision will be.

    Ajay Jain, president of Quantum Secure, points out in our cover story that security deci-sions are based on data. The more you have, the better the decisions. However, Jain points out

    that is not always the case, in part, because of the amount of data being collected by an increasing number of devises.

    More than 95 percent of alarms are false, Jain said. We tend to respond slowly because there is a good chance that the alarm isnt valid.

    I think you will find Jains comments and analysis very inter-esting. Consider this: The patterns or trends that result from analyzing the data help identify certain predictors that could in-dicate that an incident may occur.

    This could be huge, considering the amount of data that is stolen year after year. Insider threats are increasingly prevalent, and some statistics reveal that insider threats are responsible for nearly half of all security breaches.

    Also inside, one of our freelance writers interviewed Tom Galvin, president of Razberi Technologies, who addressed ques-tions about IP networking. He said networking has been around for a long time, but for the security industry, its lifespace has been about a decade.

    Galvin takes no credit for investing IP networking, megapixel cameras or an NVR, but what they have put together is a way to combine all these things into a simplified package. Razberi Tech-nologies has been able to take the complexity of IP networking and put the technology into simplified form factors. This helps the security integrator do their job at a lower cost.

    How is this all completed? Razberi has brought the market the concept of a distributed

    architecture where they have the server in a distributed environ-ment and closer out to the edge; a practice that has not been done as much with the industry move to centralization, said Reinier Tu-inzing, strategic alliance manager at Milestone Systems, America.

    From this partnership, Milestone Systems has been able to pull the information collected on the ServerSwitch back to an op-eration center and make the entire network function.

    K^W

    Enter your outstanding government security product for recognition in 2015!

    Awards to be presented

    during ISC West!

    Sponsored by

    Visit security-today.com for details and entry form.

    5

    D

    '^^W'^

    W'/

    /^t>s

    K'^

    ^'^

    '

    ^W

    '

    Untitled-2 1 12/23/14 12:34 PM

    Go to sp.hotims.com and enter 204 for product information.

    0215nws_ns04_Enter_v2.indd 4 1/6/15 10:32 AM

  • [email protected] - specotech.com

    To help find an authorized distributor with Intensifier IP inventory near you, call us at 1.800.645.5516

    2L0'Intensifier IP HD Megapixel Indoor/Outdoor Miniature Dome IP Camera3.7mm fixed lens, dark grey housing

    2L'Intensifier IP HD Megapixel Indoor/Outdoor/Vandal Dome IP Camera 3.6-16mm auto iris varifocal lens, dark grey housing7851217+(1,*+7

    Intensifier IP provides crisp, detailed images in HD resolution. With Intensifier IP technology, customers do not have to worry about losing the visibility of images in variable lighting conditions.

    The Intensifier IP Series cameras allow users to see color video in low light without IR LEDs since they work with a minimum illumination of 0.0005 lux (Intensify @ 128x) and HD color resolution. These cameras amplify existing light with no distance limitations. All objects display in perfect clarity with minimum light.

    With built-in standard PoE, WDR operation, 2 way audio communication, and alarm in/out- these cameras are perfect indoors or outdoors. These cameras work seamlessly with Specos Plug and Play NS/NSP NVRs, which can autofind the cameras in less than 60 seconds.

    )HDWXUHV See color in low light without IR LEDs Supports HD resolution @ 60fps Built-in standard PoE (IEEE 802.3af) No problems caused by objects that

    reflect or absorb IR light sources Presets for different scenarios:

    Indoor, Outdoor, Elevator, Lobby, Hallway & Low Light Wide Dynamic Range (WDR) operation Supports H.264 and MJPEG codecs 2-way audio communication Sensor input and relay output 3 axis lens mount - for easy installation IP66 compliant ONVIF Profile S

    Intensifier IP HD Camera

    IR LED Camera Standard Color Camera

    ,17(16,),(',3+LJK'HQLWLRQ6XUYHLOODQFH1HZ,QWHQVLHU,3&DPHUDV6HHDW1LJKWLQ+'ZLWKRXW,5/('V6SHFRV([FOXVLYH,QWHQVLHU7HFKQRORJ\Go to http://sp.hotims.com and enter 203 for product information.

    Untitled-2 1 1/6/15 1:58 PM

  • S E C U R I T Y T E C H N O L O G Y

    NS6 0 2 1 5 | N E T W O R K I N G S E C U R I T Y

    ACTIONABLE INTELLIGENCEData is the main player in making security decisionsBy Ajay Jain

    All security decisions are based on data. So, it would stand to reason that the more data organizations are able to collect, the more informed their security teams will be and, by extension, the better the decisions they make will be. Sadly, thats not always the

    case thanks in large part to the sheerand staggeringamount of data that is being collected today by an increasing number of devices and systems. Much of this big data has significant implications for security and when properly sorted, searched and executed, can become incredibly useful and actionable intelligence.

    The underlying problem with the current security approach is that it does not involve analyzing available data. Alarm-based se-curity processes are mainly reactive in nature. And, because more than 95 percent of alarms are false, we tend to respond slowly because theres a good chance that the alarm isnt valid.

    In essence, the alarm monitoring process itself has inadver-tently trained people that the data is so noisy as a result of the overwhelming number of false alarms that they wont be able to accomplish their job and identify a threat as it occurs in real time. As a result, threats often go undetected; or by the time something happens, its too late to do anything about it.

    Case in point: there have been many security breaches where there was actually enough relevant data located within dispa-rate sources to warn of a possible security risk, but no way for the organization to extrapolate actionable intelligence from that data. For many organizations, simply organizing the vast quan-

    0215nws_ns06_07_Jain_v2.indd 6 1/5/15 12:46 PM

  • W W W . S E C U R I T Y - T O D A Y . C O M NS7

    tity of security- and incident-related data, let alone analyzing it and utilizing it to make smart decisions, poses a tremendous challenge. Many lack a comprehensive ap-proach to making sense of all this data, and as a result end up missing potential opportunities and benefits that it presents.

    Real-time predictive analytics technol-ogy focuses on analyzing the metadata from disparate systems and devices to identify statistical patterns and trends. Of-ten, this requires examining data over the course of months or years to accurately predict what may occur at a given time. The patterns or trends that result from analyzing the data help identify certain predictors that could indicate that an inci-dent may occur.

    Insider threat is an increasingly preva-lent security concern for organizations, with some statistics suggesting it is the reason behind nearly half of all security breaches. In some cases, these types of in-cidents can be devastating, but not all in-sider threat is obvious or destructive.

    Rather, it could be as simple as a frus-trated sales rep downloading his contacts or an engineer taking code before they leave a company. Given the complex psychology behind it, insider threat can be incredibly difficult to understand and predict. This is where big data comes in, allowing security to analyze information and look at patterns across a large number of employees over a long time period to identify things that may not be obvious or intuitive.

    From this analysis, incidents that could indicate potential insider threats, known as indicators of compromise, begin to emerge. A triggering event, such as a bad performance review, a missed promotion or something similar may be the trigger that precedes an insider breach, and there-fore can serve as an indicator.

    Information related to these events is stored in the HR system and can be used to generate an initial red flag that an in-dividual may pose a threat or needs to be placed on a watch list.

    Combining this HR information with an analysis of every time that person en-ters the premises and every door he or she has accessed helps establish an individuals normal routine. By our nature, humans are creatures of habit, so an individuals regu-lar behavior pattern can be established

    relatively quickly through data analysis. These individual routines can then be

    used to develop additional metrics to in-dicate a potential threat. If an employee exhibits not only differentiated behavioral patterns but access patterns as well, those indicators of compromise show that they are a higher risk and as such should be subjected to additional scrutiny.

    For those employees who have been flagged in the system, future deviations from their routines, such as coming in to or leaving work at an unusual hour or ac-cessing areas of the building or information systems theyve never accessed before, will generate additional red flags or even alarms.

    When an employee exhibits abnormal behavior relative to their regular routine, it may indicate a possibility of a potential breach. But, these deviations could turn out to be the result of normal or regular access, and the individual may in fact pose no threat to the organization. A supervi-sor may have asked the employee to work different hours or approved their access to a particular area or system that might be required for a particular project he or she is working on.

    In these cases, supporting data from one or more systems will likely be avail-able as part of the analysis, and connect-ing those dots will make the activity un-derstandable and remove the employee from suspicion. This underscores the im-portance of collecting and analyzing large amounts of data, since without this con-text provided by predictive analysis, the data would essentially be useless.

    One real-world example of the ef-fectiveness of predictive analysis can be found in a company that was experiencing the loss of their equipment over a period of time. At first, the company was unsure who was behind the thefts, but thought it might be the work of an insider. One fac-tor was that the losses were mostly being reported in the morning, which would in-dicate that the thefts were likely occurring after hours.

    Based on this initial information, the company began to analyze data to exam-ine employee activity, beginning with iden-tifying any employees who were behaving outside of their normal routine.

    They were able to determine those rou-tines using available data that had been

    collected from a number of systems. This analysis led them to discover that a par-ticular employee had started to access ar-eas and facilities they had never used pre-viously. They were also able to determine that this access was regularly occurring outside of the employees typical hours, often in the late evening.

    A final factor was that these abnormal behaviors seemed to correspond with build-ings where the equipment was disappear-ing. From there, the company set an alarm for those types of events. The next time the employee engaged in this new behavior pat-tern, an alarm was triggered. When security staff responded, they caught the employee in the act of disassembling and preparing to steal a piece of equipment.

    As illustrated by this example, when properly analyzed, data and information become intelligence. Until now, the amount of available data has often proven too great for an organization to use properly, lead-ing to breakdowns in security processes. Predictive analysis alters this paradigm by pulling the most relevant information out of the virtual ocean of available data in order to develop the intelligence necessary to improve security. Using the intelligence gleaned from analyzing these vast amounts of available data, organizations are able to easily identify patterns, trends and behav-iors that could indicate a potential threat in real time based on irregular behaviors and access patterns.

    This actionable intelligence enables organizations to identify potential threats in real time to apply better measures and take proactive action to guard against inci-dents or breaches that data suggests could potentially occur down the road. Unlike alarm-based processes, real-time predic-tive analysis is immune to false alarms, making the process unsusceptible to the human nature that causes people to ignore or respond slowly to alarms. Recognizing a threat when its too late and responding reactively is useless for improving security.

    Taking advantage of big data, how-ever, predictive analysis transforms secu-rity from a reactive process that involves attempting to investigate in real time into a more proactive and effective process.

    Ajay Jain is the president and CEO of Quantum Secure.

    0215nws_ns06_07_Jain_v2.indd 7 1/5/15 12:46 PM

  • I N T E G R A T E D S Y S T E M S

    NS8 0 2 1 5 | N E T W O R K I N G S E C U R I T Y

    ON THE FAST TRACKData has been with man since the dawn of timeBy Brian McIlravey

    Todays integrated systems are generat-ing more data than ever before. For some perspective on just how much data were talking about, consider that from the dawn of civilization to 2003, humankind created two exabytes of data. Since 2012, its estimated that five exabytes of data are

    being generated every single day by internet-connected devices and this number continues to grow. In addition to computers, tablets and smartphones, were also surround-ed by a wide variety of other Internet-connected objects including refrigerators that can alert us when were almost out of milk or cars that can send an email when windshield washer fluid is low.

    0215nws_ns08_09_McIlravey_v2.indd 8 1/5/15 12:47 PM

  • W W W . S E C U R I T Y - T O D A Y . C O M NS9

    These are just a few examples of the expanding number of objects in our daily lives that are equipped with an IP address and integrated sensors that allow them to communicate. Technologies like GPS and RFID also help to connect these objects in an expanding network known as the Inter-net of Things (IoT).

    Security technologies also are part of the IoT and contribute to the amount of data thats created. A typical VMS, for ex-ample, may record 200 frames per second of surveillance video, while a large, dis-tributed access control system may record thousands of transactions per minute dur-ing certain times of day. This is excellent data to have available, but the challenge is the tremendous quantity of data to be processed. In some ways, the term big data doesnt come close to describing just how much is out there.

    For an incident management system, the key is sifting through all the data produced by these connections and iden-tifying the most relevant information for analysis. However, given the almost in-comprehensible amount of data thats created every day, that task of identifying, extracting, and analyzing the right data is a tremendous challenge.

    In addition to massive data sets, how systems integrate with each other has also changed drastically in recent years. At one time, the paradigm was that one system would connect to another in a linear fash-ion to facilitate a simple data exchange.

    Today, these integrations are much more complex and flow in multiple direc-tions simultaneously as systems constantly communicate and share data with each other. This new data model can be termed HV3, which stands for high volume, high velocity, and high variety. All these sys-tems and source points are generating huge numbers of transactions and other data creation events, which are happening very fast on a constant basis. As more and more devices are connected to the internet, those five exabytes of data we currently generate per day will only continue to grow.

    Its important to note that data is not information. Whether big or small, data is simply binary. In order to understand it and make knowledge-based decisions, data needs to be extracted, analyzed and visualized to solve a puzzle. Under the lin-

    ear paradigm, data produced by machines and systems would be seen and evaluated by a human, who would draw conclusions based on what they saw and understood within the data. This meant the greatest challenge was to identify and collect rele-vant data for human analysis. What hasnt changed is security practitioners need to proactively analyze information streams to detect, prevent, and solve issues. That is made more difficult with the HV3 model because there is so much data available that its no longer possible to process it us-ing traditional methods and applications. Fortunately, there are innovative new tools available that more effectively and effi-ciently extract and analyze incident-relat-ed data and turn it into usable intelligence to help organizations predict vulnerabili-ties to mitigate or eliminate threats.

    During the response and recovery phase, an organization collects data about an incident from multiple systems and sources and funnels it into an incident management solution, where it is analyzed for indicators or anomalies that help de-termine why the incident occurred in the first place.

    The intelligence gleaned from the data is then shared with departments within an organization, management, and even outside organizations like public safety entities. Using the intelligence generated by data analysis, an organization can then implement protocols, change processes and procedures and educate employees to help prevent similar incidents from occur-ring in the future.

    Incident management comprises four steps: plan and prepare, identify and re-spond, document and collaborate, and analyze. For every incident, there are pat-terns and points of reference that precipi-tate the actual event. These may include someone suddenly coming in to work ear-lier and staying later or accessing particu-lar information frequently and for longer than normal periods of time, or may be the seemingly simple act of a door being propped open. Advanced incident man-agement tools bring all that incident-re-lated data thats been collected from mul-tiple sources and systems together, as the solution reviews the datasets to look for commonalities and identify relationships between occurrences.

    Those relationships are not always ob-vious to a human and may not even occur at a single site, but they are discoverable by the algorithms within the software solu-tion. By analyzing data on a global scale, incident management solutions identify specific events, activities and occurrences that have something in common. Those commonalities paint a picture of a poten-tial threat, hazard, or vulnerability. The information is then used to identify pat-terns and anomalies that normally precip-itate an incident, which are instrumental in instituting processes that allow incident management tools to identify a potential occurrence before it occurs, rather than detecting an event as it is happening.

    Incident management also automates these tasks, allowing intelligence to be developed much more efficiently and ef-fectively than human analysis. Data is col-lected immediately, creating a record of an event, such as an unauthorized access attempt, that may signal the beginning of the type of pattern that could lead to a threat occurring. If an organization re-lies on human analysis, this type of needle in the haystack might have been missed. With automated software solutions, the software does the work of gathering data from any system or sensor for later use.

    For security practitioners, awareness is the main key to incident management and risk mitigation. Despite the sheer amount of data available today, collecting and an-alyzing the relevant information is crucial for managing threats and vulnerabilities, so its important to not only understand but embrace the HV3 data model created by the complex integration and data flow among people and the growing number of internet-connected devices and systems.

    There is no need to fear the mountain of data. Its also important to understand that these functions cannot be adequately performed by humans only. Having an ad-vanced incident management system that automates data management and analysis in your security toolbox ensures that raw data is transformed into the actionable intelligence necessary to mitigate and pre-vent incidents from occurring in the first place, ensuring a higher level of safety and security for organizations.

    Brian McIlravey is the Co-CEO at PPM.

    0215nws_ns08_09_McIlravey_v2.indd 9 1/5/15 12:47 PM

  • N E T W O R K I N G S O L U T I O N S

    NS10 0 2 1 5 | N E T W O R K I N G S E C U R I T Y

    Often taken for grantedas video surveil-lance cameras and systems can be found in virtually any public spacethe ability to deliver quality live and recorded video is a complex mechanism requiring hardware, software and networking. Because leading

    security providers excel in different areas, companies often

    join together to create market solutions that are the result of the best each has to offer.

    One of the strongest partnerships to emerge in the security industry migration to IP network video surveillance has been Milestone Systems and Razberi Technologies. This team is bring-ing distributed architecture out to the edge while still obtaining visibility in a security operations center that could be just down the street.

    ON THE EDGE OF INNOVATIONIP Video Surveillance Market Solutions Building Strong Industry PartnershipsBy Nicole Segura

    0215nws_ns10_12_Segura_v4.indd 10 1/7/15 9:39 AM

  • W W W . S E C U R I T Y - T O D A Y . C O M NS11

    They might be a relatively young company at just a few years old, but Carrollton, Texas, based Razberi Technologies has made quite a splash in the security industry with a product that seems amazingly simple. The Razberi ServerSwitch is a network video recorder, a PoE switch, storage and video management software (VMS) in one easy-to-use and easy-to-install appliance. The ServerSwitch has been purpose-built for recording and managing megapixel network video. Its embedded SmartSwitch has been designed to its internal surveillance-grade hard drives. A web in-terface enables remote control of the network switch and mea-surement of PoE consumption and data transmission.

    Rather than employing the use of traditionally large and ex-pensive network servers, the VMS runs directly on the Razberi ServerSwitch. This allows system integrators to assemble smaller, more compact systems that dont require a large IT infrastruc-ture. By combining these functions into one device, the installer saves a tremendous amount of time, and the risk of purchasing a component that cant support the demands of a megapixel envi-ronment is eliminated.

    As Razberi has grown, so has their market. Designed for in-tegrators with little IP expertise, Razberi has found that because they offered plug-and-play capability combined with robust VMS software, they became an attractive cost-saving solution for even the most sophisticated integrator.

    Known as the worlds leading provider of open platform IP video surveillance, Milestones XProtect VMS is easy to use and provides customers the ability to view live and playback video recordings, investigate suspicious incidents, and export video evi-dence for any-size camera deployment. Headquartered in Den-markwith American operations in OregonMilestone is used by more than 100,000 customers worldwide.

    Naturally, Razberi has worked closely with Milestone as they desired to provide integrations with the leading VMS solutions in the security market. But, the partnership has grown and has developed into quite an innovative video surveillance solution.

    Razberi has brought the market the concept of a distributed architecture where they have the s