a&sINDIA_Data Breach Protection in BFSI- Challenges and Solutions Flipbook PDF

a&sINDIA_Data Breach Protection in BFSI- Challenges and Solutions

112 downloads 112 Views 13MB Size

Story Transcript

STAY UPDATED

GO MOBILE

Money made simple, by Payment Apps. Security Solutions for A Multi-Site Business Leading innovation in electronic safe & Digital locks.

Shilpa Sawant Assistant Vice President Cyber Security, Reliance Industries Limited Business Talk

Manish Chandegara Ex-IT Head and CISO Insulator Business Grasim Industries Ltd. (Aditya Birla Group) Business Talk

TRUSTWORTHY BANKING Complete Visibility for Safety & central management & data Integrity

Support centralized monitoring and efficient data management which are spread out at each branch Wisenet SSM • Single core server for easy installation • Easy and fast conversion of live and playback • Various Intelligent video analytics • Quick response through rule based event action • Max. 4 monitors, 100CH real-time monitoring (single monitor–max. 64CH) • Camera connection for multiple server domains (NVR, DVR max. 10,000CH, SSM server max.1,024CH)

Hanwha Techwin Representative in India Hanwha International India Pvt. Ltd.

#35, 3rd Floor, Maker Chamber III, Nariman Point, Mumbai – 400021 #314, 3rd Floor, Rectangle I Building, D-4 District Center Saket, New Delhi – 110017 http://hanwha-security.com

* Designed and Engineered in Korea * Manufactured in Korea & Vietnam

Cloudvue

Access Control Control access to doors, gates or anything with a lock, across an entire organization

Permissions are centrally managed.

Cloudvue works with or without controllers and makes central management of access control more affordable, more secure, and available in locations where it was once impossible. More Affordable | More Secure | More Scalable | More Options

With video surveillance and access control managed together, Cloudvue keeps a linkedrecord of the credentials used to unlock a door along with the surveillance footage of when it happened.

Keys and cards are optional. Simply use an App to gain access.

Phone: +91 124 6032423 Email: [email protected] www.tycosecurityproducts.in

© 2022 Johnson Controls. All rights reserved.

Standard

Smart Camera Range The illustra Standard cameras from Tyco offers resolution upto 4MP with inbuilt IR for operations in low light conditions. The affordable feature-rich camera supports intelligent video analytics (IVA) at the edge to cater to multiple site requirements. It captures high resolution images in variety of lighting conditions with features such as True Day/ Night, Defog and Wide Dynamic Range. Rated IP67 & IK10 for an additional degree of environmental and vandal protection respectively.

Phone: +91 124 6032423 Email: [email protected] www.tycosecurityproducts.in

© 2022 Johnson Controls. All rights reserved.

India

New Generation Biometric Devices For Time Attendance

Mask & Temperature Dtection

Access Control

In-Built WiFi In-Built WiFi

MiniTA

MiniAC Plus

SpeedFace V5L[TI]

MiniAC

Web-Based Time Attendance Software with Mobile APP Applications

Outdoor Mobile Punches

WhatsApp Notification

Auto Synchronization

Real-Time Reports

ZKTeco India Factory B-1, Khata no. 31, Devasandra Industrial Estate, BBMP K R Puram, Whitefield Main Road, Mahadevapura, Bengaluru - 560048.

Bank

Simple Access Control

Hospitals

: +91 99801 54338

Contact : 080 6828 1342/48

Email ID : [email protected]

Sales

Research Centres

Website : www.zkteco.in

Technical

Protect your server rack with Aperio® solution Aperio® is an advanced wireless technology which adds more functional security to your server rack doors while integrating with any access control platform

Compliance Ensures you comply with data protection obligations

Improved monitoring Access to authorised users, provides audit trails, real-time monitoring

Locking status Unlock, lock, temporary unlock

Power supply Battery operated

Credentials Can be used with existing high frequency RFID credent

Override SFIC mechanical key override

www.assaabloyopeningsolutions.co.in Email & Support: Mr. Prathamesh Sawant Mr. Shrilesh Mane

[email protected] [email protected]

Mobile: 91674 21041 Mobile: 95270 11575

CONTENTS M ARC H 202 2 | www. a s i n d i a . i n

Business Talk Shilpa Sawant, Assistant Vice President Manish Chandegara, Ex-IT Head and

Vertical Market

....20

BFSI Sector must have Robust

View Point

....36

Payment Apps

20

Technology

....56

Cloud Storage Working

a&sInternational

....39 ....40

How security systems integrators

36

War in Ukraine: What it means for

42

Special Feature

....42

Multi-site Video Monitoring

Launch Pad

....63 ....64 ....66

VIVOTEK and Immix Announce

56

48

Hanwha Techwin Introduced more Smart Parking Solution

Case Study

Contents

....04

Editor's Note

....06

BIT improves security and customer

Reader's Feedback

....08

Sovereign Safe Controls Access to

News Feature

....10

Tech Insight

Corporate News

....15

Multi-Site Video Monitoring

Product Showcase

....50

Product Exploration

Advertiser Index

....76

Electronic Safes & Digital Locks

4

MARCH 2022

www.asindia.in

....12 ....18

....68 ....70 ....73

ODM Educational Group Prioritizes



....74 ....48

Small steps to a better future: BFSI Industry

B

anking, financial services and insurance (BFSI) is the industry’s umbrella term for companies that provide a range of such financial products or services. The Banking part of BFSI may include core banking, retail, private, corporate, investment and cards. Financial services may include stockbroking, payment gateways, and mutual funds. Insurance covers both life insurance and general insurance.

a&sINDIA, published by Oil Asia Publication, is a monthly professional publication for channel players in the Indian electronic security industry. It serves importers, distributors, OEM/ODM searchers, system integrators and other product purchasers to update product sources and identify development of CCTV, Digital Surveillance, Access control biometrics, intrusion alarm, Intercom/video door phone, home automation and other fields related to electronic security. a&sINDIA also covers active and passive fire protection and emergency rescue management issues. It contains articles on cutting-edge products, technical applications and safety code issues in India and many other themes of interest to fire safety professionals.

BFSI courses help in nurturing the human resource of the Banking sector. These courses give you an insight to practical functioning of the industry, prepares you for the risk factor, and enhances your knowledge regarding the rules and regulations that govern banks and financial institutions.

Manish Gandhi

Graphic Designer Sarvesh Jha Advertising Circulation & Subscription Allwyn Fernandes Aparna Kadam

Digital transformation allows financial institutions to know what the people actually want. They can formulate their financial services and offer according to customer requirements rather than guesswork. New innovative technological developments allow banks to strengthen customer engagement with personalized offerings. Banks are proactively working to raise awareness amongst customers and providing guidance on the basics of good security. Cybersecurity and data privacy will become a unique selling proposition (USP) for many financial institutions and big tech organizations. In this scenario, consumers will manage access to their data residing on applications, web and other digital channels, with the burden of complying with increasingly stringent regulations being the responsibility of banks. In this edition of a&sINDIA we attempt to highlight the recent developments and security solutions for the BFSI Sector. Focusing on the tech revolution in the industry, importance of cloud storage, multisite monitoring, and digital banking and payment apps. Along with the security risks faced while moving into this Era. We express our heartfelt gratitude towards patrons, peers and professionals in the security and fire industry, for their continued support. We would also like to appreciate all the coronavirus warriors. Due to them, the nation is being able to contain the COVID-19 pandemic. Thank you! Your suggestions and feedback are valuable. Please feel free to reach out to us with your views on the edition.

Manish Gandhi [email protected]

MARCH 2022

[email protected]

Shreya Raj Editor

BFSI is set to grow exponentially in India due to the rising per capita income, introduction of new products, innovation in technology, expanding distribution, networking and increasing customer awareness of financial products. BFSI Industry has seen bold reforms in the last 15 years and will continue to be a top priority focus industry for India’s economic development based on inclusive growth.

6

Publisher & Chief Editor

www.asindia.in

Business Unit Manish Gandhi

Director Sales

Mumbai Delhi Bengaluru

+91-22-4286 3760 +91-11-6629 5700 +91-80-4852 4410

[email protected]

[email protected]

Messe Frankfurt New Era Business Media, Publisher of a&s India (a subsidiary of ABECL) 530, Laxmi Plaza, Laxmi Industrial Estate, New Link Road, Andheri (W), Mumbai - 4000 53, India.

Oil Asia Publication Private Limited,

Oil Asia Publication Private Limited (OAPPL), founded in 1983 by Surendra Mohan Singh Gandhi, is a more than 25-year-old publication, engaged in publishing industry specific magazine, organising exhibitions and conferences related to the oil, gas and petrochemical industry. The portfolio of a&s Magazine, published by Messe Frankfurt New Era Business Media (formerly known as a&s Group), includes a&s International, a&s International China Best Buys, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, a&s Taiwan, Fire & Safety and Info Security (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions. For change of Address or subscription problem, contact us at [email protected] Copyright@2011 Oil Asia Publication Private . All Rights reserved. No parts of this magazine may be republished, reprinted, redistributed, or reproduced in any way, including electronic, without prior written consent from the publisher. Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent, image or trademark disputes from advertisements or among advertisers.

Insight: • BFSI Sector must have Robust Security • Payment Apps • Multi-site Video Monitoring • Electronic Safes & Digital Locks

STAY UPDATED

GO MOBILE

Money made simple, by Payment Apps. Security Solutions for A Multi-Site Business Shilpa Sawant Assistant Vice President Cyber Security, Reliance Industries Limited Business Talk

Leading innovation in electronic safe & Digital locks.

AI in BFSI Sector Artificial Intelligence has been at the center of the technological revolution in the majority of industries. It has helped in enhancing business processes and improving work efficiency across all sectors. While not an exception, the BFSI sector has been comparatively “change-resistant” which has seen some rate of tech adoption in the past two decades. Artificial Intelligence (AI) has been a huge change maker in the sector. However, the major challenge faced by the sector in faster adoption of AI has been a lack of understanding of the application, sustainability and feasibility of the technology. Therefore, today, I want to deepdive into the benefits that early adopters are experiencing and the opportunities that are still left unexplored. Furthermore, as digitalization is spreading across the globe, customers are becoming more empowered. They have access to a wide array of products offered by the traditional as well as dynamic new entrants. As the choices increase, the customer’s loyalty becomes more friable and the customer becomes more empowered. I found the BFSI focused a&s India magazine a good read. --- Pranav Singh Vatsa, Bihar.

8

MARCH 2022

a&s India is one stop information magazine I really like the professional focus maintained by a&s India in bridging the security industry professionals and the other sectors. I always search for new products with updated versions and features. Generally, the suppliers keep surfing google and fail to reach the correct people and many a times the contact details are correct and that is frustrating. The products displayed and details given in a&s make it simpler as once you glance through it, you feel your search ends here.

Manish Chandegara Ex-IT Head and CISO Insulator Business Grasim Industries Ltd. (Aditya Birla Group) Business Talk

Smart transportation and smart city traffic management are revolutionary how cities approach mobility and emergency response, while reducing congestion on city streets. We’re no doubt just at the very first stages of what’s ahead with smart transportation. “Smart cities” are already taking off and more of these are definitely on the horizon. I enjoyed reading the entire edition. It is exciting to read about possible future advancements, which will be in place eventually. --- Anand Patil, Allahabad.

The ads and editorials are very informative and I always find them explained in details and easy to reach, a&s India is a one stop magazine to let everyone knows about security services and importance.

FEBRUA

FEBRUARY 2022 | www.asindia.in

RY 202

132

132

--- Vidya Prasad, Jamshedpur.

Smart Transportation

Facial System

Everyone wishes that their commute to work was a little bit faster, a little bit better. In fact, we want to go anywhere that we are going more quickly and comfortably than ever before.

www.asindia.in

Recognit

ion is

Integrat

Anti-The ft Facial Recognition is Imperative to Increase Security

Smart transportation is not just a theory for the future; it is being implemented today in several cities with their success and failures being used to improve systems in new locations.

2 | www .asindia

System Integration Ensures Smooth & Seamless Operations for Every Organization Anti-Theft Devices

Imperat

ive to

ion Ensu

Devices

res Smo

Increase

oth &

Ashish Ashok Mahakal Chief Security Officer, The LaLiT Mumbai

Security

Seamless

Operatio ns

for Ever

y Orga

ln conversation with Chief Security Officer

nization

Ashish Chief Ashok Mah Secu akal The LaLiT rity Offic Mumbai er, ln conv ersation Chief Security with Officer

For security and fire safety news update log on to: www.asindia.in

www.facebook.com/asindiamag

https://www.linkedin.com/company/asindia

.in

Google Cloud Compares Block chain to Open Source/Internet, Forms New Team Google Cloud announced the formation of a new Digital Assets Team for blockchain technology, whose rise it compared to that of open source and the internet. Those would seem to be heady comparisons for a fledgling

technology still not well understood by many, but the perennial No. 3 cloud computing provider is making a big blockchain bet to help catch up to Amazon Web Services (AWS) and Microsoft Azure. As part of the move, Google said it’s also exploring future opportunities to let cloud customers make and receive payments using cryptocurrencies, the premier use case for blockchain so far. Google’s move is in stark contrast to Azure, as Microsoft last year ended the Azure Blockchain service and advised users to migrate to other blockchain offerings. No reason was given.

BSF installs CCTV surveillance system at Bangladesh-India border India’s Border Security Force (BSF) has set up CCTV surveillance systems along the Bangladesh-India border in western Assam.

The force’s Inspector General (IG), Guwahati Frontier, Sanjay Singh Gehlot inaugurated the surveillance system on Tuesday, reports Indian media.

The GCP apparently has a different take on the tech. “Blockchain technology is yielding tremendous innovation and value creation for consumers and businesses around the world,” Google said in a Jan. 27 blog post. “As the technology becomes more mainstream, companies need scalable, secure and sustainable infrastructure on which to grow their businesses and support their networks. We believe Google Cloud can play an important role in this evolution.” The platform’s new dedicated Digital Assets Team will help customers in building, transacting, storing value and deploying new products on blockchain-based platform. “Over the past few years, blockchain has rapidly gained popularity because of its ability to store transactions in an immutable format.”

Officials believe that this initiative would help monitor and control all activities along the frontier and further enhance round the clock vigilance to control border crimes. According to BSF officials, the CCTV surveillance system would facilitate them to closely watch the border area day and night to curb smuggling and heightened activities of smugglers, antinational and inimical elements.

Bangladesh and India share a 4,096km border, and along with fencing, the BSF has also installed various other smart surveillance systems to further enhance vigil, especially in smuggling, crime and infiltrationprone areas.

10

MARCH 2022

www.asindia.in

Reference from multiple sources

While interacting with his men, Gehlot instructed them to remain extra-vigilant and also to maintain a high level of operational preparedness.

iVIS integrates a series of AI and IOT technologies with intensive monitoring of realtime video streams by trained security personnel and stops theft before it happens!

ry

R

s

s

Je ail & welle et

lar Farms So

s

ries & Pla cto nt Fa

struction Sit on e C

rveilla nc e

Su ty Ci

nks & ATM Ba

ds

ational Stand ar ern nt

I

uristic R & D Fut

n

nology + Intuit ch io Te

atical Serv Fan ice

Contact iVIS WIRELESS TRANSMISSION SERVICES Live Video Monitoring Technology Event Based Monitoring System

System wirelessly telecasts video & audio to One of our CMS (Central monitoring stations) 4G SIM Aggregation

REMOTE INTERVENTIONS

[email protected] www.ivis.net

Remotely start sirens, strobes & messages via public address system on perception of threat Two Way Communication

Virtual Guard Tours Indoor Monitoring System General Monitoring

SOLAR POWERED

REDUNDANCIES

Use of solar panels and “aggregated” cellular connectivity for seamless transmission.

Battery Backup Wireless & Wired Network Cloud and Local storage Dual monitoring centers

Army Gets New Aircraft Systems For Surveillance The Army has initiated a number of measures to bolster its surveillance mechanism along the LAC following the eastern Ladakh standoff.

New Delhi: The Indian Army on Wednesday said it has acquired ‘mini remotely piloted’ aircraft systems which will

further enhance its surveillance capabilities in high-altitude areas. The Army has been significantly focusing on cranking up its surveillance mechanism along the Line of Actual Control (LAC) with China as part of a broad strategy to beef up overall military preparedness.

The Army has initiated a number of measures to bolster its surveillance mechanism along the LAC following the eastern Ladakh standoff.

Reference from multiple sources

Representative Image

As part of ongoing modernisation & induction of niche & emerging technologies at tactical level, #IndianArmy has acquired “Mini Remotely Piloted Aircraft Systems”. These #RPAs will further enhance the surveillance capabilities in High Altitude Areas,” the Army tweeted.

11

Shilpa Sawant

Assistant Vice President Cyber Security, Reliance Industries Limited Briefs about cyber security and risk management as well as data privacy

Do briefly tell us about your journey so far. I am a Cyber Security Professional with 14 years of experience and presently working as an Assistant Vice President with Reliance Industries. An Education background of B Tech in IT and a Masters in Networking chalked my path into this field. Interview of Shilpa Sawant, Assistant Vice President , Cyber Security, Reliance Industries Limited.

12

MARCH 2022

The journey so far has been overwhelming and equally challenging. As the Cyber Security field has been evolving and advancing, there is always an innovation involved to keep up or be ahead in the race. I believe that the best part of being in Cyber Security is that it’s a dual role that we need to play - the battle is always with the external world and the internal world. While we are always in a state of defending against cyber-attacks in the external world, there is also a need to justify or make businesses and users understand the importance of Cyber Security, which is equally, if not more, challenging. While there are tools and technologies to protect against external attacks, it was essential to develop strong interpersonal skills, the right attitude, as well as exclusive strategies to handle the stakeholders and enable the business securely. In addition to this, the learning www.asindia.in

The success of the Cyber Security Program depends on having a sound security strategy encompassing preventive and detective measures, simplified processes, awareness, and intelligence-driven security operations along with a plan of continuous improvement.

Shilpa Sawant Assistant Vice President - Cyber Security, Reliance Industries Limited

curve never ends in this field. It is imperative to be aware of the trends and advancements in technologies and adversarial tactics. Recognition and acknowledgment within this fraternity as well as certifications such as CISM and CISA from ISACA have added as a motivation factor to achieve and contribute more. This decade-long experience with India’s biggest conglomerate gave me to an opportunity to work at a group level on different domains, complex environments with diverse and large businesses having unique compliance requirements. My expertise has been mainly around cyber security strategy, IT and security risk management, devising innovative approaches, frameworks and solutions, governance, vulnerability

management programs, cyber security architecture, awareness, compliance, and the latest being Security in digital transformation. This broad exposure has been quite fulfilling, and I still consider myself to be in the 1st mile of my journey. There is still much more to contribute to the community to make this digital world a secure space to live in. Briefly share your contribution in improving an organisation’s efficiency & data security. The success of the Cyber Security Program depends on having a sound security strategy encompassing preventive and detective measures, simplified processes, awareness, intelligence-driven security operations along with a plan of continuous improvement. I was involved in completely transforming

the organization from erstwhile Information Security to Information Risk Management. This necessitated in setting up comprehensive policies of the group, appropriate technology controls, and embedding a Cyber Security Culture with continuous awareness within the businesses. Continual improvement initiatives were initiated to improve the maturity level and benchmark against the best practices. Developing and implementing innovative security frameworks such as competency frameworks, new-age IT technologies have been my forte. Executing a Cyber Security Awareness Program where I had to periodically launch out-of-the-box campaigns making the organization realize the importance of Cyber hygiene, and encouraging users to practice Cyber Appropriate Behavior. This has been

13

personally satisfying, as now we have enabled & empowered more people to be part of the Cyber arsenal. A good governance structure is critical for measuring the performance of any function. Overseeing the cyber security programs and operations for all the group companies regularly and identifying improvement areas has immensely helped the organization improve its efficiency. In spite of the latest technology and software being used why are the cyber-attacks increasing? How can it be secured? According to me, this is the only field that has been so dynamic. Outlook of the Cyber Security practitioner and strategy changes almost every 2 years. Earlier, it was prevention, then CISOs focused on prevention plus detection, proactive detection and now, as cyberattacks are inevitable, the strategy is around cyber resiliency. While organizations are revolutionizing their digital landscape and adopting next-generation technologies to launch digital platforms, this unfolds new attack avenues and provides a platform for cybercriminals to penetrate into the network. Cyber-attacks have become more sophisticated, where the adversaries today are using advanced technologies such as AI/ML & innovative techniques to launch attacks. The motive of attackers has transformed over the years. The target of cybercriminals is not an organization anymore but industry or the state or the nation. In the Darkweb, the underground economy, launching attacks on an organization is offered as a service. With this kind of evolving landscape, Cyber Security Solution providers and product companies are forced to think at least 2 steps ahead before they launch a new product or feature, or functionality. It has also brought industries together where this is collaboration and strategies defined for a common goal. It’s a huge challenge for the cyber security teams to justify the investments as the threats are growing manifold and existing solutions may not be effective to detect all the new

14

MARCH 2022

variants. Hence, practitioners are also focussing on developing homegrown approaches and solutions to address the risk. This brings another challenge of skilled resources to develop and maintain the solutions. As cyber threats show no signs of slowing down and with cyber talent drought, organizations are still at high risk, despite investing so much in defense technologies. There is no silver bullet to achieve the desired state - efforts have to be put in the areas of people, process, and technology. A risk-based approach should be embraced to fortify defenses and seamlessly integrated Security into business processes to protect critical data. Share one of the most interesting assignments that you handled. While gaining knowledge on the technical aspects of Cyber Security keeps me on my toes, executing Cyber Security Awareness Campaigns is something that I’m passionate about. It is like pursuing a target that is always moving and that in itself is taken up as a challenge to go after and beat time over time. Phishing Attacks are one of the growing concerns for any organization today. Although numerous approaches have been developed to detect and prevent phishing attacks yet there is no foolproof solution

www.asindia.in

that can detect and prevent 100% of phishing attacks. The tactics tried by cybercriminals are very sophisticated where they try to exploit the cognitive thinking of users. Therefore, Humans here become the 1st line of defense, not the last line of defense as most cybercriminals try to obtain initial access or foothold into the network using phishing tactics. Strengthening the human firewall needs a detailed study on behavioral design and psychology. The program that I was instrumental in developing has proven to be a game-changer in our domain. It is based on an iterative E-E-E lifecycle – Educate, Evaluate and Elevate and strives to make users resistant to phishing. This led me to the research mode on Cyber psychology and the behavior patterns of users and then based on that formulate a program on varying human behavior to ensure users don’t fall prey to phishing attacks irrespective of their emotional state. This being an iterative program, knowing the user’s susceptibility factor and accordingly planning the next action is quite revolutionary in today’s times. This programs’ success has not only helped users identify any form of phishing attacks but is recognized to be a strong cyber defense control – the first one of its kind.

The security hub will be one of the only two centers globally, the other one situated in the US. “The new facility represents a strategic hub for IBM cybersecurity activities in the region, which also include IBM Managed Security Services, access to IBM’s team of incident response experts, as well as IBM Consulting, IBM Research, IBM India Software Labs, and IBM Garage, a collaborative approach designed to fast-track innovation.” The centerpiece of this investment is the new IBM Security Command

Meta unveils AI projects aimed at building the metaverse

The investment also includes a new Security Operation Centre (SOC), which is part of IBM’s network of existing global SOCs - providing 24x7 security response services to clients around the world. IBM’s global SOC network now includes 9 locations such as Atlanta (US), Australia, Costa Rica, Japan, Poland, and Saudi Arabia. IBM’s new SOC will have a capacity of 600 security response operators who will provide managed security services to clients across the globe. “The new IBM Security Command Center is the first in Asia Pacific enabled to train the entire business in the art of response to a cyberattack event, further enhanced by the real-time experience of our security experts based in the adjoining global Security Operations Center. With Asia Pacific’s enormous growth, diversity, and role in global supply chain,

According to the latest IBM global analysis, Asia is the most targeted region for cyberattacks – representing 26% of attacks analysed in 2021. The data reveals a significant regional shift compared to the past decade of the report, where North America and Europe have historically ranked as most-targeted. This trend signals a growing need for security investments among Asian organizations, particularly those in financial services and manufacturing, which were the most-targeted industries in the region.

will be the successor to the mobile internet. “The key to unlocking a lot of these advances is AI,” he said, speaking at the company’s livestreamed “Inside the Lab” event. Zuckerberg said Meta was working on a new class of generative AI models that will allow people to describe a world and generate aspects of it. He showcased an AI concept called Builder Bot -- which allows users to describe what they want the AI to generate.

Facebook-owner Meta is working on artificial intelligence research to generate worlds through speech, improve how people chat to voice assistants and translate between languages, CEO Mark Zuckerberg said, as he sketched out key steps to building the metaverse. Zuckerberg is betting that the metaverse, a futuristic idea of virtual environments where users can work, socialize and play,

these capabilities can be a real game changer for helping customers face growing threats in the region.”

“As we advance this technology further, you’ll be able to create nuanced worlds to explore and share experiences with others, with just your voice.” He also said Meta was working on AI research to allow people to have more natural conversations with voice assistants, a step towards how people will communicate with AI in the metaverse. Further, he said it had brought together a global consortium of 13 universities and labs to work on the

largest ever-egocentric dataset, called Ego4D. The company also said it was working to make a single AI system capable of translating between all written languages. Zuckerberg also announced that Meta was working on a universal speech translator, aiming to provide instant speechto speech translation across all languages. Meta also recently announced its research team has built a new artificial intelligence supercomputer that it thinks will be the fastest in the world when completed in mid-2022.

Reference from multiple sources

IBM launches its first cyber security hub in India

Center, the first-of-its-kind in the region, for training cybersecurity response techniques through highly realistic, simulated cyberattacks – designed to prepare everyone from C-suite through technical staff.

15

Airtel acquires strategic stake in Blockchain-tech startup Aqilliz

such as Adtech, Creator Economy, and Loyalty Programmes,” said Adarsh Nair, CEO, Airtel Digital. Aqilliz has developed a patented hybrid blockchain platform called ‘Atom’ that integrates differential privacy and federated learning on a distributed digital ledger.

Airtel aims to deploy Aqilliz’s Blockchain technologies at scale across its fast growing adtech, digital entertainment and digital marketplace offerings. “Blockchain technology is maturing and we see its application across areas

Wipro invests in US based AI startup vFunction

Wipro Limited has formed a joint go-to market partnership with Palo Alto-based startup vFunction. The partnership will reinforce Wipro FullStride Cloud Services’ position as a leading provider of digital transformation solutions and further Wipro’s commitment to accelerating cloud innovation for clients. Wipro Ventures, the corporate investment arm of Wipro, has invested in vFunction’s Series A.

16

MARCH 2022

The Airtel Startup Accelerator

“We are proud to partner with vFunction to enhance our cloud offerings and provide clients with additional capabilities in a critical sector. Wipro is investing over USD 1 billion over the next three years to build out the capabilities of Wipro FullStride Cloud Services, and we are committed to working with partners and other industry leaders to deliver a cloud ecosystem that meets our clients’ needs.” vFunction has developed a scalable, AI-based technology platform for modernising Java applications and accelerating migration to the cloud. The firm helps enterprises to eliminate the time, risk, and cost constraints of modernising business applications.

www.asindia.in

Programme invests in early-stage startups working on technologies that have adjacencies to Airtel’s business offerings. The programme gives startups an opportunity to deploy their technologies and applications at a massive scale, which includes more than 340 million retail customers and over 1 million businesses.

“Wipro is an established leader in the cloud segment, and we are excited to partner with them to accelerate our joint customers’ journey to cloud-native architecture. As more and more businesses embrace the cloud to gain a competitive edge, this partnership will be critical in helping them realise the benefits of application modernisation and moving to the cloud.”

Reference from multiple sources

Bharti Airtel announced that it has acquired a strategic stake in Singapore-based Blockchain platform Aqilliz for an undisclosed sum.

This allows brands to create secure and consent-based solutions to engage with customers in a rapidly-evolving digital economy that’s becoming increasingly decentralised. “Aqilliz’s patented technology will enable Airtel to capture and carry this value exchange in the form of consent and provenance across the digital supply chain,” said Gowthaman Ragothaman, Founding CEO, Aqilliz.

The study states that the distribution shift between training data and unlabeled data was reduced using a shift-robust regularize. Google AI research scientist Bryan Perozzi and research intern Qi Zhu have released a study that offers an answer for using Graph Neural Networks on biased datasets. Called ‘Shift-Robust GNNs: Overcoming the Limitations of Localized Graph Training Data,’ the research shows how a new method can measure the distributional differences between

Tech brands sign on to HackerOne responsible security drive Tech companies sign HackerOne’s new corporate security responsibility pledge to bring cyber out of the shadows and promote effective, secure development practices The aim of the pledge is to encourage an industry-wide call to action for more transparency and a positive culture around cyber security best practice, as well as ultimately to build a safer internet for all. It focuses on four key areas: • Encouraging transparency to share cyber intelligence and build trust. • Fostering a culture of collaboration that makes the tools needed to reduce risk in the hands of everybody. • Promoting innovation by inspiring developers to work with security in mind.

Machine learning models face issues with generalizing from the biased training data, as the shift grows wider. This affects the generalizability of a model adversely. When a dataset’s accuracy was tested using a statistical analysis called the F-score, it was found that domain shifts led to a decrease in performance by 15-20 per cent. As the distribution shift increases, the classification accuracy of the dataset decreases, which makes it hard for GNNs to generalize models as the difference between the training dataset and test dataset, also increases. The study states that the distribution shift between training

data and unlabeled data was reduced using a shift-robust regularize. This technique assesses the domain shift during the training and then penalizes it. This force the model to ignore the training bias as far as it can. Results from the research showed that SR-GNN was more effective on biased training datasets and beat GNN outcomes in terms of accuracy. It also reduced the negative impact caused by biased data by 30 per cent to 40 per cent.

• Holding pledges and their suppliers accountable to following best practice to develop security as a point of differentiation. Starling Bank’s head of cyber security, Mark Rampton, said: “At Starling, we assume that everything has the potential to be vulnerable, and believe that hyper-vigilance is the best way to stay ahead of threats. “Security isn’t something we can do in isolation. We work with every member of our staff – and the wider security community, including HackerOne – to ensure we continually fulfil our mission of keeping customer funds and data protected.” TikTok’s global chief security officer, Roland Cloutier, added: “Transparency is core to TikTok’s business and brand. We deliver

transparency on everything from content moderation to our bug bounty programme, so our users are free to innovate and fulfil our mission of inspiring creativity, and bringing joy. A majority of security professionals also tended to feel they struggled to build a positive security culture within their organisation, while 65% of security pros said they have internalised the message from on high that their work slows down and blocks innovation.

17

Reference from multiple sources

Google AI introduces Shift-Robust GNNs to improve generalizability in models

biased data and a graph’s true inference distribution. The largeness of the shift between two probability distributions also helps account for bias.

Manish Chandegara,

Ex-IT Head and CISO Insulator Business Grasim Industries Limited (Aditya Birla Group). Briefs about increasing cyber-attacks and data security.

Interview of Manish Chandegara, Ex - IT Head and CISO Insulator Business Grasim Industries Limited (Aditya Birla Group)

Do briefly tell us about your journey so far. Highly skilled professional with more than 20 years of experience in driving vision and road mapping across various assignments and in architecting business solutions using ground-up development Proven competency in IT Infrastructure Operations, Project Management, Process Enhancement and ERP Implementation Received Award from Microsoft COO for successful implementation of AZURE Microsoft Cloud in Maahi Milk Producer Company Ltd., Rajkot Skilled in IT Infrastructure Management by Layer-wise management of computing hardware, virtualisation, middleware, networking & storage Proven success in strategic planning & building IT solutions involving selection of appropriate technology, finalizing Service Level Agreements for timely & successful completion/delivery of the projects Managed: • Audit of ISO 9001 2000, OHSAS, and BS7799 (Int. auditor for Adani Port IT Dept.) • ITGC Audit for Adani Group, Magna Automotive, and Maahi Milk Producer Company Limited Hands-on experience in designing, deploying, administration, maintaining & supporting Windows, Citrix, Cloud, (MS Azure & VMware Administration

18

MARCH 2022

www.asindia.in

Proven record of setting up & supporting all areas of IT Infrastructure with expertise in System & VMware Admin., Networking & Security Successfully analyzed information system needs, evaluated end-user requirements, designed custom solutions and troubleshot complex information systems Led a team of resources for operations & management of entire (OCC) Operation Control System on 24X7 basis. Managed implementation & initiated the operation of OCC with standard & guideline of France and USA OCC in a short time period. Headed operation of OCC, India and provided remote support for 250+ production server (Including SAP ERP) and mainframe systems including 2 major data centres in France and USA Defined/ implemented IT policy & standard process as well as budget planning & expense conformance while guide the team for day-to-day service support to 84 plants in world (remote support) Spearheaded implementation of IT infrastructure of OCC India centre along with planning for execution of infrastructure projects for India based plants Briefly share your contribution in improving an organisation’s efficiency & data security. Implemented PAM, MFA, Intune, crowd strike, XDR & EDR for data security & Concentrating on securing the walls around data seems to be the focus in many organizations, with almost 90% of security budgets spent on firewall technology. However, there are hundreds of potential ways to circumvent a firewall; including through customers, suppliers and employees. All of these people have the ability to bypass

Implemented PAM, MFA, Intune, crowd strike, XDR & EDR for data security & Concentrating on securing the walls around data seems to be the focus in many organizations, with almost 90% of security budgets spent on firewall technology.

Manish Chandegara Ex-IT Head and CISO Insulator Business Grasim Industries Limited (Aditya Birla Group).

exterior cyber-security and misuse sensitive data. For this reason, you need to ensure that your security efforts are focused around the data itself, not just the perimeter. It’s easy to visualize threats originating from outside your organization, as these are often represented in news and television as the biggest and most costly ones. However, the reality is that it’s your insiders that can potentially hurt you the most. Due to their nature, insider attacks can be difficult to detect and prevent. It can be as simple as an employee clicking on an email attachment they believe to have come from a trusted source and releasing a ransomware worm. These kinds of threats are the most prevalent across the world and the most costly. Make sure that all data is stored in

an encrypted format and remains encrypted during migrations. If you think installing an antivirus on every computer or device will protect your company from attacks, think again. As recent data breaches have shown, hiring a professional organization to conduct a security audit will always reveal weaknesses you were not expecting. I encourage you to take a walk around your office and look at your employees’ desks. I guarantee, if you look hard enough, you will spot a password written down on a sticky note. Inspite of the latest technology and software being used why are the cyber-attacks increasing? How can it be secured? The adoption of cybersecurity solutions is expected to grow with

the increasing penetration of internet among developing and developed countries. Also, the expanding wireless network for mobile devices has increased data vulnerability making cybersecurity an integral part of every single organization across the world Keep zero trust architecture in place, never trust any inbound connection request, Keep updated all security tools, always try to keep critical server behind firewall Share one of the most interesting assignments that you handled? Implemented MS team during Covid 19 lockdown where in no any employee was coming office entire implementation was done online over VPN & remote access.

19

Robust Security services is a complete solution for all your security needs. 20

MARCH 2022

BFSI

is referred to as Banking, Financial, Services, and Insurance sectors that include commercial banks, insurance companies, non-banking financial companies, cooperatives, mutual funds, retail, and other entities. Financial organizations across the globe are focusing on enhancing cyber threat protection programs, whereas, in India, BFSI institutions still lack in acknowledging the importance and aftereffects of cyber security. Security breaches, data thefts, compromised passwords are some common forms of cyber-attacks that are of great concern for BFSI organizations. As technology upgrades, new competent cybercriminals and cybercrime strategies are also developing to neutralize the protective security measures taken by Indiabased BFSI organizations, which shows that the existing cyber security strategies implemented are not enough to secure the gaps in the business systems.

www.asindia.in

Aditya Khemka

Managing Director, CP PLUS (Aditya Group)

BFSI provides the foundation for many of the financial exchanges of all the other sectors. It has become an integral part of other critical infrastructure systems and an essential component of the overall national critical infrastructure. The key security concerns for the BFSI Sector According to Aditya Khemka, managing Director of CP PLUS, ‘‘It won’t take an expert to surmise that as the time is advancing, the world is to witness an increasing threat perception and even more targeted and sophisticated attacks, prone to which is the Banking, financial services and insurance sector. As a recent study has indicated that Indian customers are more likely to use a mobile app for banking than customers in Australia, Britain and the UAE, these mobile-first customers are more vulnerable to malware variants devised to steal personal banking information by cybercriminals. Increasing demand for faster BFSI transactions, particularly the ones across the border, are being targeted by cybercriminals.” Cybersecurity breaches continue to grow in both frequency and sophistication for all industries, and the financial sector is particularly vulnerable. Financial services firms fall victim to cybersecurity attacks far more frequently than businesses in other industries. Security breaches lead to lost revenue for banking institutions, interruptions in operations and loss of both reputation and customers.

In the USA alone, the statistics on the devastating effects of breaches in the financial industry are quite overwhelming as the cost of cyberattacks in the banking industry reached $18.3 million annually per company, 8 out of 10 US citizens fear that businesses are not able to secure their financial information. According to the FBI, the amount paid to ransomware scammers has reached nearly $1 billion per year and 92% of ATMs are vulnerable to hacks. “Financial establishments experience threats from a variety of sources led primarily by mobile applications and web portals. Cybercriminals may steal or manipulate valuable user data and or ‘clone’ banking apps in order to use them for nefarious purposes. Banking customers are moving away from using cash and checks and relying more on electronic banking to complete transactions. In response to this shift, financial organizations continue to develop more web portals and mobile apps. Although these apps and portals are aimed at increasing convenience and enhancing the customer experience, they pose unique risks in terms of cybersecurity,” comments Mr. Khemka. In light of these conditions, the government of India has been focusing on public procurement projects where a preference is given to the Make-in-India initiative.

21

Numerous government made mobile and apps and web portals are coming up, so that the public does not have to depend on foreign apps, especially Chinese apps and web portals, which entail a higher risk of hacking as many of the Chinese tech companies have been deemed as working for the Chinese government or are controlled by it. A 2018 study by Accenture reviewed 30 major banking applications and found that all 30 had vulnerabilities ranging from insecure data storage to insecure authentication and code tampering. What’s more, a similar study revealed that 85% of the tested web apps had flaws that would permit cyber-attacks against users. In September 2019, a cyber-attack on Cosmos Bank in Pune, India resulted in Rs. 94 crore being stolen. In 2016, Bangladesh Bank, the country’s central bank, was hacked and the hackers successfully stole 81 Million USD. The hackers used the bank’s SWIFT credentials to transfer money into various banks across the globe before the heist was discovered. Hackers had used a combination of social engineering and viruses to obtain employee credentials and access the bank’s network to make the transfers. Fortunately, the transfer of 800 Million+ USD was stopped after the discovery of the breach. These incidents make it clear that the negligence of cybersecurity can have severe consequences on the banking sector. Further, he states, “One key factor in this regard is the insider threat. Insider threats refer to current or former employees who may have been responsible for security breaches in an organization. This is a major issue for banks – in 2015, Morgan Stanley fired a financial adviser in its wealth management division who stole data from 350,000 clients or 10% of its customer base. In fact, 82% of financial organizations considered insiders with legitimate access as the main threat to cybersecurity.”

According to the report, 2020 has significantly affected the way cybercriminals operate. These changes will further impact the financial threat landscape in 2021. A known botnet, observed Emotet, spreading the QakBot banking trojan at an unusually high rate. In October 2020, a software defect led to a disruption to the European Central Bank’s main payment system for almost 11 hours. Owned and operated by the region’s central banks, it processes around €2 trillion in transactions a day, equivalent to $2.35 trillion and around a fifth of the eurozone’s annual economic output. In June 2020, the Australian Government released a statement that the Australian Cyber Security Centre (ACSC) had advised that “a sophisticated state-based cyber actor” is currently targeting Australian organizations. The attacker then uses legitimate remote accesses using stolen credentials. “There are three major attack vectors that banking institutions and financial organizations need to consider. The first is the personal security of individual members accessing their accounts, the second is the security of the tools you build for them to access their accounts, and third is your own internal team as they access your back-end servers and internal network (as well as the data housed on your network). Where you have a higher degree of control is on the security measures you build into your web portals and applications. Using monitoring and blocking technologies that protect from things like client-side JavaScript injection will help ensure that users aren’t experiencing auto-redirect attacks or having login data skimmed,” observes Mr. Khemka. According to Sudhindra Holla, Director – Axis Communications, India & SAARC., there is tremendous opportunity for security solutions providers in the BFSI sector today with increased number of transactions, the queues at ATMs have also increased leading to emphasis on improving the existing security systems. Further, he states, some of the key security concerns for the banking sector sector are as follows –

22

MARCH 2022

www.asindia.in

Constraint doesn’t allow end-users to keep all security gadgets in synchronized manner and monitor all the devices on one integrated platform. Budget Constraints: Budget constraints sometime force end-user goes with very economic items and some branches have very old systems, which prevents the user to have clear details /upgraded footage to use it for forensic analysis or business intelligence. Multi-Location Issue: Multi-Location

Ashish P. Dhakan

MD & CEO, Prama Hikvision India Pvt. Ltd.

The main concern for BFSI security continues to be the fastest changing technologies, bandwidth issues and seamless integration of security solutions at branch level.

• The biggest challenge is shifting the mindset of the institutions. Many banks are still dependent on outdated analog cameras for their surveillance needs • A poor cybersecurity solution may act as a great obstacle in the BFSI sector as it might lead to the leakage of sensitive information of the bank and the customers • Account-related frauds is also a popular security concern for the BFSI sector. It is important to prevent hackers from utilizing banking knowledge to get access to private data leading to unlawful transactions. According to Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd., the India’s banking sector is perpetually facing major security challenges related to physical security risks and online frauds. Most of the cases that are currently being reported across India are related to physical and electronic security incidents. The India’s public and private sector banks are not well equipped to handle the threats in real-time scenario in a proactive manner. Despite RBI guidelines the security awareness and compliance remain a big concern in the Indian Banking ecosystem. It is clear that new threats demand renewed

attention to Bank and ATM physical security framework. The Indian Banks need an urgent systemic overhaul of their physical security infrastructure to secure their assets, customers and business. Further, he says, the main concern for BFSI security continues to be the fastest changing technologies, bandwidth issues and seamless integration of security solutions at branch level. The physical security challenges faced by the bank branches are as follows: The challenge gets bigger when the theft physically occurs in the branch and the incident video data, including storage device is stolen by the criminals. The Banks must train the banking staff on physical security systems and forensic investigations to overcome the risks and challenges. Some of the vital security apprehensions are as follows: Seamless Integration of security Systems: Bank branches are spread in multiple states with different environments, the seamless integration of security systems becomes a challenge due to cost, technology and bandwidth constraints. Interoperability: Different Brands and different Installation type by vendors make it very difficult to achieve interoperability of security systems. Bandwidth Constraints: Bandwidth

23

issue makes it difficult to capture footages, videos onto the central monitoring systems. Uniform Maintenance Protocol for Surveillance System: No uniform maintenance protocol for surveillance system is followed by the end-users. The surveillance systems are not stable and strong. There is no active deterrent to stop vandalism or theft of the systems. Updates on Hardware & Software: Low resolution camera, old legacy systems, poor image quality, limited storage capacity, lack of clarity add to the difficulties in detailed investigations (related to incidents). ATM Security Awareness: The lack of ATM security awareness causes huge loss to bank and consumers. Breakdown of ATM machines, card reader installations, skimmers rob customers after withdrawal, customer dispute, unidentified person withdrawal, burglary of ATMS machines along with recorders, Risk Mitigation: The lack of risk mitigation mechanism and standard operating procedure makes banks more vulnerable. The Bank also has problems like low degree of intelligence, passive defense and low efficiency management. According to Manmohan Kumar, Sales Director India Security Division, Rosslare Electronics India Pvt. Ltd., considering the current volatile market, Banks are more concern about the required security today. Customer Centric Security Solutions are being implemented for making more loyal and confident customers. Bank Locker is one place where customer as well as Banks need more security and transparency for building customers faith with their system. ROSSLARE’s RFID and Biometric Based Locker Solutions are Smart, Secure and Easy to operate and perfect to build loyal and faithful customers. According to Sumanth B A, Regional Sales Manager for Hanwha Techwin India. BFSI globally is a huge market

for surveillance, which is having major concerns on cyber security. Any cameras, which is vulnerable to Cyber Security, is always a threat to the organization, which is using such products. According to Maïté Herrero, Industry Marketing Specialist at Genetec, Inc. Financial institutions can deploy anywhere from a handful of devices at a single branch to thousands across multiple locations. However, regardless of their size, security departments need to be able to manage all their devices across their enterprise and see everything at all times. In addition, as financial institutions continue to grow in size and complexity, they must also ensure that they deploy and maintain a physical security foundation that will safeguard people and assets. Finding a solution that will help them identify threats, reduce fraud losses, close cases quickly and manage security at their branches, corporate headquarters and data centers is crucial. However, for decades, banks have been using legacy solutions to cobble together their physical security systems. This siloed approach to security cannot keep up with changing customer needs or the evolving threat landscape that banks are dealing with today. These systems now pose a serious challenge as banks work to protect themselves against rising cyber threats and look to use analytics to improve operations. A siloed approach has also kept banks from centrally managing their network infrastructure as well as coordinating operations across all locations. In addition, it is this lack of a global view that makes it difficult for banks to effectively leverage physical security data and ensure a consistent level of cybersecurity protection across all branches. According Parthesh Dhaggal, Founder, Enceplon., the key security concerns for the BFSI sector are cyber threats, unencrypted data, weak passwords, viruses, malware, third party services that are not secure, cloning debit/ credit cards, phishing, identity thefts, account-centric frauds, threat from employees, supply chain attacks,

24

MARCH 2022

www.asindia.in

Sumanth B A

Regional Sales Manager, Hanwha Techwin India.

BFSI globally is a huge market for surveillance, which is having major concerns on cyber security.

theft-proof comprehensive security solution for their banks. Sensitive areas like the cash counters, locker rooms, and server rooms demanding a high level of security are left unguarded due to a lack of adequate security coverage of the branch. Therefore, it is of prime importance for financial institutions to secure their premises. Additionally, banks have to restrict access to sensitive areas to ensure that the valuables and data are not tampered with. Key Drivers

network data theft, terrorists’ financing, money laundering, unauthorized users’ access to unsecured resources on many computer networks, including the data on any connected computers. A newer type of cyber security threat is spoofing – where hackers will find a way to impersonate a banking website’s URL with a website that looks and functions exactly the same. When a user enters his or her login information, that information is then stolen by hackers to be used later. Even more concerning is that new spoofing techniques do not use a slightly different but similar URL – they are able to target users who visited the correct URL. Political interference, sanctioning of huge loans without adequate security and loan waivers weakens the BFSI sector. According to, Kaushal Kadakia, Marketing Manager, Matrix Comsec., one of the primary concerns of the BFSI sector is securing their banks and ATMs from miscreants. Annually an average of 1000 incidents pertaining to ATM robbery occurs which leads to a loss of crores to the banks. In spite of having avant-garde security deployments like video management software, financial institutions overlook the need to design a

According to Aditya Khemka, In recent years, revolutionary and evolving developments in the retail, finance, IT, security and automobile industries have provided new skills, automation and ease of service. However, these innovations have also emerged as a dominant force in the growth of the global threat environment of bugs, hacks, and malware. The increasing prevalence of digitization has caused organizations to rely heavily on digitized information. Sharing a large amount of data in an external and internal environment, as well as around the globe, has caused companies to fall victim to cybercrime across multiple modes of attack. Technologies like the Internet of Things (IoT) and new business models rely heavily on global digitization for their development. As the network is

25

getting more sophisticated, integrated, and holds more details, the access to the threat surface has become even wider while at the same time highlighting the vulnerabilities in the company protection framework thus boosting market growth for cybersecurity. Futher, he says, “BFSI provides the foundation for many of the financial exchanges of all the other sectors. It has become an integral part of other critical infrastructure systems and an essential component of the overall national critical infrastructure. BFSI runs in a highly regulated environment. In various cases, security incidents occur because of non-compliance to various standards. If this happens, the consequences are severe. Thus, BFSI security is needed to ensure the long term visibility of banking and financial organizations and their data.” The BFSI security market was valued at USD 35.3 billion in 2020 and is expected to reach USD 66.02 billion by 2026, at a CAGR of 11% over the forecast period (2021 - 2026). Banks and other financial institutes are under increasing scrutiny to ensure they have the appropriate security measures in place, especially in the wake of the numerous high-profile data breaches that have taken place over the last few years. The increasing implementation of regulatory standards, coupled with the rise in adoption of cloud-based security solutions and increasing modes of online payments is expected to give rise to advanced security solutions. This is because the adoption of cloud-based technologies has made data more vulnerable to security attacks. Hackers have begun using malware, such as Odinaff, Danabot, Camubot, and Backswap, to target banks that rely on the SWIFT network to send moneymoving messages. This has led to customers demanding more effective solutions. In countries, such as Qatar, where significant investments in infrastructure are being made for the 2022 FIFA World Cup, banks are also investing in advanced security solutions.

“Cyber protection is often referred to as information technology (IT) protection, emphasizing the need to secure machines, networks, services, and data from unlicensed or random access. Cybersecurity and cyber attacks are becoming more relevant in today’s changing digital world. Situations have become critical in the company due to increasingly rising theft, fear, cybercrime, risks and vulnerabilities. As cyber-attacks have become increasingly significant, security strategies have also made progress. Factors such as an increase in malware and phishing attacks and an increase in the rate of BYOD and IoT adoption among organizations is driving the cybersecurity market. The global cybersecurity market is segmented based on offering, deployment, component, industry vertical, organization size, and region. Based on the component, the market is bifurcated into services and solutions. The services sector is likely to grow at a high CAGR in the coming time. Organizations are recruiting third-party suppliers for their protection templates, thus stimulating the development of security as a service (SaaS). In comparison, third-party suppliers on the market are giving the clients a reliable solution at a reduced cost thus boosting market growth”, notes Mr. Khemka. Based on offering, the market is categorized into infrastructure security, identity and access management (IAM), data security and privacy service offering, governance, risk & compliance, and unified vulnerability management service offering. The market for IAM held almost 25% share of the market in 2019 as the number of cyber-attacks has risen worldwide, alleviation of the casualties resulting from these events has become a major concern in all industries. Rising cyber-attacks on small and medium-sized businesses are likely to fuel demand for IAM and enterprise security solutions. “Additionally, the adoption of cybersecurity solutions is expected to grow with increasing investments from countries such as India, Italy, Spain, Canada, Oman, South Korea, Qatar, and others. Also, the rising demand for enterprise security solutions from banks and other financial institutes is anticipated to boost the market size in the forthcoming years.

26

MARCH 2022

www.asindia.in

Maïté Herrero

Industry Marketing Specialist at Genetec, Inc.

When a bank deploys a unified solution, the system can automatically associate video and other data streams, like access control. This both reduces the time necessary to find and correlate information and eliminates human error. In the present scenario, security related to the BFSI sector has become the primary concern for the corporate, public and private divisions. The growing adoption of e-commerce and the advancement of disruptive technologies such as AI and blockchain has increased the addition of cybersecurity solutions in a connected network ecosystem. As per the current market, these factors will also enormously boost the cybersecurity market growth in the coming years.” According to Sudhindra Holla, some of the key drivers of the security solutions market for the BFSI sector are as follows – Block chain Technology can act as a powerful security tool to check unlawful access to bank account details during transactions Integrated Security Solutions provide a single platform, which makes it easier to monitor business operations and help in swift notifications and raising alert in case of a breach Biometrics infused with technologies like AI and analytics can help dentify patterns of network activities to detect real-time cyber-attacks

Cloud Technology provides a platform to store huge amount of data, which can be scaled and categorized According to Ashish P. Dhakan, the key drivers of the BFSI security solutions market, includes increased security awareness, enhanced threat perception, rise in bank and ATM robberies, a growing number of financial crimes. The key restraints of the BFSI security solutions market remains a lack of policy framework and standards, low level of awareness, budgetary constraints and legacy technologies and platforms, interoperability and integration of various security systems, cybersecurity and data security concerns. In the wake of the rising number of thefts related to Currency Chest and Locker Room, Reserve Bank of India (RBI) has issued the revised instructions for the same. These instructions are mandatory. The revised instructions have come into force with effect from January 1, 2022 (except where otherwise specified) and be applicable to both new and existing safe deposit lockers and the safe custody of articles facility with the banks. Further, he says, according to RBI Instructions, the Infrastructure and Security Standards for Security of the Strong Room/Vault are as follows: Banks shall take necessary steps to ensure that the area in which the

27

locker facility is housed is properly secured to prevent criminal break-ins. The risks of accessibility of an allotted locker from any side without involvement of the locker-hirer concerned may be assessed and kept on record. Banks shall have a single defined point of entry and exit to the locker room/vault. The place where the lockers are housed must be secured enough to protect against hazardous impact of rain / flood water entering and damaging the lockers in contingent situations. The fire hazard risks of the area should also be assessed and minimized. The banks, as per their policy, shall conduct necessary engineering / safety verification regularly to identify the risks and carry out necessary rectification. The area housing the lockers should remain adequately guarded at all times. The banks shall install Access Control System, if required as per their risk assessment, which would restrict any unauthorized entry and create digital record of access to the locker room with time log. As per their internal security policy, banks may cover the entry and exit of the strong room and the common areas of operation under CCTV camera and preserve its recording for a period of not less than 180 days. In case any customer has complained to the bank that his/ her locker is opened without his/her knowledge and authority, or any theft or security breach is noticed/ observed, the bank shall preserve the CCTV recording till the police investigation is completed and the dispute is settled. The security procedures shall be well-documented and the staff concerned shall be properly trained in the procedure. The internal auditors shall verify and report the compliance to ensure that the procedures are strictly adhered to. This move by RBI will have a significant impact on the Banking Security Management. According to Manmohan Kumar, Customers confidence with the system is surely the best driver which pushes Banks to have one of the best security solutions. If a Bank implements ROSSLARE’s Fingerprint or RFID

Based Locker System where Lockers can be operated only through Dual Identification (Fingerprint of Bank Officials and Users Combined), surely customers will get attracted with the fool-proof security system of the Bank and will show the faith by keeping their valuables with the Bank. As easy and convenient banking is the requirement of the day, ROSSLARE’s Smart Locker Solution is surely for the same. According to Sumanth B A, we at Hanwha Techwin are able to serve such BFSI clients by ensuring impeccable Cyber Security with stringent high level security policies like user certification, firmware/database encryption and back door removal across our wide range of products. We also have an industry leading cyber security with ULCAP certification for the products, which are powered by Wisenet 7 SOC. These products also have advanced AI analytics loaded on the camera which would give immaculate accuracy when it comes to the analytics utilization in real use case scenario. According to Maïté Herrero, increasing cyber-attacks and the emergence of omni-channel banking are pushing security & IT teams at the corporate and branch level to want to modernize. However, upgrading existing infrastructure at each branch can be prohibitively expensive. The costs can include end-of-life for existing hardware, on-site structural modifications, purchasing new systems, allocating additional space for servers, and labor for every phase of an upgrade. Without a unified solution, large-scale banks have trouble seeing all the equipment they own or determining if they are meeting cybersecurity protection requirements at all branches. Implementing a unified security platform like Genetec Security Center allows for centralized monitoring and greater control over the management of physical security systems at each location. This means a bank can monitor operations at all its branches, including remote and isolated locations, without disruption and ensure that consistent cybersecurity standards are being maintained at all times.

28

MARCH 2022

www.asindia.in

Manmohan Kumar

Sales Director India - Security Division, Rosslare Electronics India Pvt. Ltd.

Bank Locker is one place where customer as well as Banks need more security and transparency for building customers faith with their system.

A unified system also helps security personnel and law enforcement during a post-event investigation. With disparate systems, extracting video for an investigation is labor-intensive and prone to human error. When an incident occurs at a branch, security personnel have to search through hours of video from multiple cameras to identify and collect the footage they need. This process is even more difficult and time-consuming when an investigation requires looking through video from multiple branches. When a bank deploys a unified solution, the system can automatically associate video and other data streams, like access control. This both reduces the time necessary to find and correlate information and eliminates human error. The evidentiary process is also greatly simplified when multiple locations are involved because the system itself can search through and correlate video feeds and other data from every branch. Banks need to develop a comprehensive strategy for addressing the challenges associated with having a series of branches located across a territory or around the world. A two-step

approach that involves unifying systems and moving operations to the cloud would give them greater control while saving money and improving operational efficiency. According Parthesh Dhaggal, the key growth drivers of BFSI Security Solutions are effective implementation of regulatory security compliance, rising demand for cloudbased security solutions, nationwide computerization, transformation to digital banking, seamless user experience at retail locations, advanced data analytics, securing human-cyber touchpoints, safe, secure payment gateways, penetration of internet in tier 2 & tier 3 cities and many towns in India. Further, he said, automated self-operating systems, over a billion mobile users across India, governments and private sectors and civic administration’s initiatives and growing cyber-attacks are driving growth. The restraints are inadequate cyber security, lack of awareness of modern BFSI security systems across developing economies and the need for convergence of various security solutions, legacy technology, inadequate infrastructure, insufficient skilled manpower, connectivity problems, many disparate tools in the system and lack of coordination among the stakeholders.

29

According to, Kaushal Kadakia,the driver of the BFSI physical security market is the rising demand for cloud-based security solutions. Banking and other financial institutions need security solutions that are easy to install and all the data fetched can be accessed from a central location. For instance, cloud-based video surveillance systems to cloud-based access control systems are being installed to proactively deal with potential threats. The security solutions for the BFSI market get further impetus from the convergence of their existing security solutions. For instance, video surveillance integration with their existing access control systems gives a boost to security as institutions are always on the lookout as they don’t want a single layer of security for their premises. The Security system market for the BFSI sector can be deeply restrained by the inability of the solution to provide centralized command and control for the innumerable locations in which the bank operates. The distributed structure of the banks would also mean the unavailability of reliable data networks for remote locations. Additionally, the physical security solution should be able to integrate seamlessly with the existing security infrastructure of the bank. If the solution cannot accommodate existing brands of devices it would push the cost of the solution and deter the customer from embracing newer technology. Furthermore, the reliability of the solution is a major concern for the BFSI sector, if the system So, if the platform cannot provide central control to the banks or other financial institutions it can act as a restraint. Moreover, if the platform is exclusive to the parent company’s devices and it is not device and platform agnostic it might act as a restraint for the buyer. Another factor that can act as a back step is the system malfunction which might make the customer doubt the reliability of the system. Other features include the risk assessment carried out by the customer which might influence their judgment.

Cyber Threat Intelligence According to Aditya Khemka, “Machine learning, AI and big data have been the focal points of data intelligence and data-driven culture for years now, influencing many new technologies and developments. Data can do a lot for us, but raw data is only the product of observation and entails nothing more than that, it is an analysis that brings forth the predictive powers of the data. That’s the reason why the world has been turning to data intelligence. As we are living in the age of data, the explosive data growth that we are experiencing is most likely to keep booming. Data intelligence or cyber-threat intelligence was introduced because especially in cybersecurity, the power to predict future attacks even they reach targeted networks can help organizations in prioritizing their responses, speeding up the decision-making process as well as response time, and in providing better security altogether.” Threat intelligence is a widely-used term now. If you are a cybersecurity professional, you must be familiar with the term even if you don’t fully understand the nuances. Threat intelligence plays a crucial role in today’s cybersecurity defence apparatus and must be correctly understood by professionals working in the various domains of cybersecurity, especially those in security operations centres, dealing with SIEM like tools or those that work with incident response teams. Cyber threat intelligence is what cyber threat information becomes once it has been collected, evaluated in the context of its source and reliability, and analyzed through rigorous and structured tradecraft techniques by those with substantive expertise and access to all-source information. Like all intelligence, cyber threat intelligence provides a valueadd to cyber threat information, which reduces uncertainty for the consumer, while aiding the consumer in identifying threats and opportunities. It requires that analysts identify similarities

30

MARCH 2022

www.asindia.in

Parthesh Dhaggal Founder, Enceplon

Key growth drivers of BFSI Security Solutions are effective implementation of regulatory security compliance, rising demand for cloudbased security solutions, nationwide computerization, transformation to digital banking, seamless user experience at retail locations, advanced data analytics, securing human-cyber touchpoints, safe, secure payment gateways, penetration of internet in tier 2 & tier 3 cities and many towns in India. and differences in vast quantities of information and detect deceptions to produce accurate, timely, and relevant intelligence. “Threat intelligence, specifically, is collecting and analyzing information about the indicators of past, current and future cyber threats, which enables an organization to take actions to protect their assets, network and the entire organization. It is imperative to note that the keyword here is ‘analysis’. Many security advisors while describing cyber attacks, mention the term ‘variant’. An attack is a variant of some other attack that has occurred before. It will not be wrong to conclude that most of the attacks are only derived from other attacks

and that it is not difficult to create attacks or rather exploits. Hence, even when compromised systems are analysed by threat hunters, they find common suspicious connections or IP addresses that have the capability to bypass existing security solutions,” comments Mr. Khemka. The presence of such artefacts in compromised systems is nothing but indicators of compromise (IOC). Analysis of IOC’s enable security researchers to understand the attack and defend their system or network from similar attacks in the future. Threat intelligence is based on the same idea. The goal is to collect indicators of compromise on national and international levels from different sources, correlate them, and send it to systems like SIEM in the nextgeneration firewalls (NGFW) that provide real-time analysis of security alerts so that it is monitored and examined by security analysis to take correct remediation steps. This importance of threat intelligence has also led to monetary investment by organizations in threat data. Rather than being developed in an end-to-end process, the development of intelligence is a circular process, referred to as the intelligence cycle. In this cycle requirements are stated; data collection is planned, implemented, and evaluated; the results are analyzed to produce intelligence, and the resulting

31

intelligence is disseminated and re-evaluated in the context of new information and consumer feedback. The analysis portion of the cycle is what differentiates intelligence from information gathering and dissemination. Intelligence analysis relies on a rigorous way of thinking that uses structured analytical techniques to ensure biases, mindsets, and uncertainties are identified and managed. Instead of just reaching conclusions about difficult questions, intelligence analysts think about how they reach the conclusions. This extra step ensures that, to the extent feasible, the analysts’ mindsets and biases are accounted for and minimized or incorporated as necessary. Further, he said, “The process is a cycle because it identifies intelligence gaps, unanswered questions, which prompt new collection requirements, thus restarting the intelligence cycle. Intelligence analysts identify intelligence gaps during the analysis phase. Intelligence analysts and consumers determine intelligence gaps during the dissemination and reevaluation phase. One of the biggest takeaways of cyber threat intelligence is the change of security approach from reactive to proactive. It brings proactive defence against any threats that emerge outside your landscape before they even hit you. But it can only do that if it’s relevant, punctual and actionable. So, data presented in cyber threat intelligence needs to be contextualized, evidence-based, and relevant.” According to Sudhindra Holla, Cyber threat intelligence can be beneficial in the following ways – • It can be more cost effective as Cyber Threat Intelligence not only detects potential threats but also comes up with defense strategies or solutions to prevent the threat timely • Cyber Intelligence Threats helps in better efficiency of the security team with regards to

identification and nature of potential threats • Cyber Intelligence Threats helps in highly minimizing the risks by identifying new threats and vulnerabilities According to Ashish P. Dhakan, The Cyber Threat intelligence benefits organizations of all shapes and sizes by helping process threat data to better understand their attackers, respond faster to incidents, and proactively get ahead of a threat actor’s next move. For SMBs, this data helps them achieve a level of protection that would otherwise be out of reach. According Parthesh Dhaggal,Cyber Threat Intelligence or CTI benefits everyone in security. It boosts the organization’s cyber defense capabilities It helps intelligence analysts to uncover threat vectors and actors, and equips to make more accurate predictions to prevent the misuse or theft of information assets. The CTI is cost-effective and it improves the efficiency of an organization’s security team, lowers risks and prevents data breach. Intelligence provides the power to look on the far side the organization perimeter and establish threats before they manifest. Furthermore, CTI enhances internal security systems by configuring security controls with threat intelligence to mechanically block vital threat indicators. It provides bigger insight to the management to assign an ample budget to mitigate business risks. It offers high-level situational awareness to management and executives to grasp vital threats and assign necessary resources to shield essential assets and business processes. It improves the communication with internal and external stakeholders concerning numerous business risks and feasible actions of the threat factors in the future and helps improve both security and bottom-line. Latest trends in security solutions in the banking industry. According to Sudhindra Holla, some of the rising trends for security solutions in the banking industry are–

32

MARCH 2022

www.asindia.in

Kaushal Kadakia

Marketing Manager, Matrix Comsec

The BFSI sector is more concerned with indoor security due to sensitive areas such as locker rooms, cash counters, and data centers to handle huge customer databases they opt for Dome IP cameras or Turret IP Cameras in order to secure their premises. • Cybersecurity – A strong cybersecurity solution is a must for all banks to prevent data breaches and thefts • New Regulations – Regulations are necessary for better management of data and security and data can act as both a potential liability and an asset • Cloud -Based solutions – Cloud-based solutions are becoming increasingly popular in the BFSI sector as it can pose to be more flexible and agile making it suitable for banks to open satellite ATMs and new branches • Remote Monitoring - Remote monitoring is an important feature of many solutions allowing unparalleled flexibility for security directors to act fast and efficiently during a breach or emergency According to Ashish P. Dhakan, The BFSI space is now adopting contactless security technologies faster than ever. The secure contactless payment is going to be the fastest growing trend in the future due to the challenges posed by the pandemic. Mobile wallets will be soon more prevalent than physical wallets. The

threat of financial losses has made companies innovate in the field of cybersecurity. To not suffer from reputational damage and face the regulatory consequences, BFSI companies are innovating to detect loan frauds and cyber crimes. With the growing IP trend, Hikvision’s latest Smart Banking Security Solutions are best-inclass in the market. These include, Advanced Artificial Intelligence based Applications Cameras and Access Control Terminals with Facial Recognition, Acusense and ColorVu Cameras with Smart Applications and All-Inone Intrusion Alarm Solutions. These advanced surveillance and security systems offer following outcomes, which includes, High Definition Surveillance, Intelligent Applications, Centralized Management, and Maintenance Management. VIP Customer Service With a busy bank having large numbers of people through the doors every day, it could be useful to be able to help with customer service. But it can also be used to help with customer service. When clients opt to participate in VIP customer service programs, facial recognition technology can give banks accurate tools to identify VIPs so staff can provide the right kind of service at the right time.

33

When the security around the vault needs to be strengthened, there are facial recognition options too, which can be supported by a Hikvision DeepinView camera. If the camera is connected to an access control system, it could literally be that only registered people could enter. Deep Learning Technology Solution for ATMs In an ATM machine, two covert cameras are installed, one trained on the user, the other on the ATM panel. Deep Learning technology embedded in the ATM security system can detect any ‘abnormalities’ in the facial scene in front of it, referring to existing data patterns. So, if there is another face in the picture (for example, someone looking over a user’s shoulder), or if the person wearing a mask, an alarm can be triggered in the security center. Using the same technology, the security system can also flag if the number pad is covered with a strip to steal PIN codes, or if a false card reader (or ‘skimmer’) is present to steal card details. The Deep Learning ‘engine’ here would be the Hikvision DeepinMind NVR, which takes the information from the camera and analyses it while using Deep Learning algorithms. This can also ‘manage’ footage, in conjunction with other NVRs and a video management system, which brings this part of a total solution together with all the other elements, providing a powerful toolset for security and business intelligence. According to Manmohan Kumar, having one of the best Intrusion Alarm System combined with Robust RFID or Biometric Based Locker System are surely the best trends utilizing the best of the Security Technology available in the market. ROSSLARE’s RFID / Biometric Based Advance Locker System allows user the convenience of operating their Lockers with their Unique Fingerprints which cannot

be transferred or stolen. Dual Authentication provides the perfect Security Scenario. No need to carry a key and no fear of misuse. According to Sumanth B A, an innovation in image quality and cyber security all Hanwha products complies to NDAA standard which is the basic key for cyber security. Both X Series & P Series product lineup which are powered by Wisenet 5 & Wisenet 7 SOC are the one which has been chosen by many BFSI cliental and have made these models as their global model across their retail outlets and offices. Few key points to highlight Wisenet 7 SOC powered cameras: • It comes with 4K resolution which has vivid images and would help in detailed Forensic search during an event of crime • Its extreme WDR balance and optimize the images during the harsh backlighting which would give the clear images even during fluctuation of different backlight. • Its advance Lens Distortion Correction improves the images seen with the wide angle lens by correcting the distortion. • It also reduces the noise during the low light condition which would again help in detailed forensic review • Data transmission to all the securely connected devices also has enhanced encryption and ensures a safe delivery. Lastly Hanwha Techwin is able to bring more value to the table with reliable products and enhanced cutting edge technology through which ROI for our cliental is all assured in a shorter timeline. According Parthesh Dhagga, automation and integration, rapid transformation to digital banking, securing remote work in the post CIVID 19 World, cloud deployments , multi-cloud data storage , hybrid deployments, shared infrastructure, face detection, automatic threat detection, interactive tools, teller kiosks, multiple services through

34

MARCH 2022

www.asindia.in

Sudhindra Holla

Director, Axis Communications, India & SAARC.

Cloud -Based solutions – Cloud-based solutions are becoming increasingly popular in the BFSI sector as it can pose to be more flexible and agile making it suitable for banks to open satellite ATMs and new branches. smart technologies are some of the rising trends Also, there are adoption of AI for fraud detection & mitigation, remote monitoring capabilities, Increased Reliability on Advanced Blockchain Systems , Introduction of Secure Access Service Edge (SASE) Solutions , new regulatory technologies, IoT with 5G network are the rising trends for the banking industry. For BFSI industry we at Enceplon provide automatic 24x7 Remote Monitoring Health Services to report any anomaly or untoward incidents to our clients and alerts them so that they can immediately take action to prevent robber4y, burglary, vandalism, CCTVs failure , DVR or NVR malfunctioning by furnishing regular updates. These don’t require manual intervention but can be done remotely. Suppose due to heavy monosson rains a bank staff cannot reach the banks then no problem. Enceplon RHMS takes care of the manual operations and keep the business going and the properties safe and secure. The RHMS model is spreading fast in India as its saves cost, time and unnecessary manpower as many of the operations can be done from remotely.

According to, Kaushal Kadakia, the banking sector relies heavily on robust security solutions as security breaches could lead to huge losses and dent the reputation of the bank. The reliability of the bank is a critical driver for their business. Efficient security solutions are proactive in dealing with theft, loitering, and intrusion. Intelligent video analytics have attractive capabilities like missing object detection, motion detection, intrusion detection to combat security threats. Again, if the miscreants try to tamper with the security device like cameras then, immediate notifications are sent. As the BFSI sector is more concerned with indoor security due to sensitive areas such as locker rooms, cash counters, and data centers to handle huge customer databases they opt for Dome IP cameras or Turret IP Cameras in order to secure their premises. Again, Bullet IP cameras act as a line of defense in the external peripheral environment of the banks or financial institutions. As in the case of access control solutions, contactless access control solutions are being deployed post-COVID-19. With physical contact as a red sign for banks, the shift has been seen towards implementing contactless access control solutions. Solutions like Bluetooth-based access control and QR-based access control, access control based on palm vein authentication, face recognition are being deployed.

35

Payment Apps Secure Payment Apps are Essental for Seamless E- Commenrce

P

ayment Apps (also referred to as mobile money, mobile money transfer, and mobile wallet) generally refer to payment services operated under financial regulation and performed from or via a mobile device. Instead of paying with cash, cheque, or credit cards, a consumer can use a mobile to pay for a wide range of services and digital or hard goods. Although the concept of using non-coin-based currency systems has a long history, it is only in the 21st century that the technology to support such systems has become widely available. The apps allow you to use your cell phone to make in-store purchases. These apps use technology called

36

MARCH 2022

www.asindia.in

Near-Field Communication (NFC) so you can tap or wave your phone to pay at the POS terminal. Generally, the apps use either encryption or protected code to reduce the threat to your personal data. Generally, it works like; the bank sends the request to your payment system (MasterCard, VISA, etc.) The payment system analyses your reputation and analyzes the term of money transaction. Your bank sends an authorization code that approves the payment system to complete the payment. Mobile payments are becoming a key instrument for payment service providers (PSPs) and other market participants. Ultimately resulting in cost savings and in an increase in business volume. The benefits of using banking and payment apps There are a number of benefits for the users of banking and payment Aps such as they offer offer unparalleled convenience, speed and accessibility to consumers, flexibility of payments, lower risks, ease of Payments from one’s mobile phones, swiftness of transaction, maintain record of every transaction.

Enable biometrics (fingerprint sign-on or facial recognition) 11. Not download and install third-party apps, such as Screenshare, Any desk, TeamViewer. 12. Check for secure connections. When visiting your bank’s website or conducting an online transaction, check your browser to verify a secure connection. If the web address starts with “https,” you should have a secure connection. These are the essential steps that people should take to avoid fraudulent activities. People should immediately report the incident to your nearest cybercrime center and lodge an FIR (first information report) providing relevant details like your mobile number (from where the transaction took place), transaction details, card number and bank account) to police. Login to your UPI app and go to ‘Help’. Many apps allow you to report fraudulent incidents. Digital banking transformation for 2022. The digital transformation in this year include Data & AI will differentiate the winners from laggards, shift to mobile first customer focus, Increased emphasis on ESG & DEI, More control for customers, embedded finance and banking-as-a-service (BaaS), Cloud computing, user-friendly and intuitive graphic interface, bigger growth for fintechs. In 2022, data-driven personalization and digital banking technology will also help democratize wealth management by helping people with their investments and trading. There are currently millions of underserved customers who don’t have the means to access their own financial advisor. Automation to enhance customer care experience: AI-enabled virtual assistants will continue to play a key role in helping

38

MARCH 2022

www.asindia.in

customer-care representatives have more personalized interactions with customers and provide speedier resolutions. ML and AI to drive customer proximity: Companies within the industry are leveraging ML and AI not only to automate tasks within the loan/lending processes but also to get deeper customer insights to help customer service representatives to detect opportunities to upsell and cross-sell. The policies and standards of banks will become much more open and customized. Enabling customers to invest globally: Banks are leveraging cloud, data and analytics, and digital solutions to offer their customers the ability to invest globally across markets. Automation to allow many payments firms to cultivate superior data management and deliver the seamless experience customers now expect. The integration of physical into the digital experience will become the cornerstone for how the metaverse evolves. At Enceplon, we help banking and payment gateways by through RHMS which monitors all systems from remotely automatically 24x7 and sends constant notifications should there by any malfunctioning, failure or foul play. Connected ecosystems will find their footing as embedded commerce proliferates.

Besides, there is no need to carry huge amount of cash to make the payments, no fear of losing cash or getting fake currency and users can make payments remotely. Safe and convenient mode of payments, avoid altogether standing in long lines, help you pay the exact amount required to pay and saves cost, time and processing fees. Some banks and establishments offer cashbacks or reward points, loyalty benefits and better operational efficiency. Such Aps enable the customer to transfer money from his or her account, order cheque books, receive updates, invest in FDs, Shares, Mutual Funds or issue an order to stop payment of a particular cheque. Challenges associated with banking and payment apps? Cyber Security, Technical issues, Identity Theft, Connectivity Problems, Privacy Concerns, Regulatory Compliances, Ensuring Data Security, Resilience & System Vulnerabilities and Compatibility of digital wallets with all the mobile models, are some of the major challenges besetting banking and payment apps.

The integration of physical into the digital experience will become the cornerstone for how the metaverse evolves. Parthesh Dhaggal Founder, Enceplon

Steps taken to avoid fraudulent activities They should 1. Not share PIN, OTP and Passwords with anyone. 2. Use a strong password for online banking.3. Change passwords periodically. 4.Refuse to give out account related information over the phone or email .5. Use anti-virus protection software, firewalls and spyware blockers.6. Not use public computers for online banking. 7. Report lost cards immediately. 8. Not leave blank space on your check 9. Watch out for skimmers. 10.

37

a&s INTERNATIONAL

Source: Prasanth Aby Thomas, Consultant Editor (asmag.com)

How security systems integrators can beat the rise of DIY

D

IY security products that come under the umbrella term of smart home solutions have become popular among consumers worldwide. This has become a challenge for physical security systems integrators who focus on residential projects. COVID-19 amplified this challenge. While more people were at home after the pandemic struck, health care guidelines limited any professional work. Does this mean that systems integration for residential security is no longer a viable business? Asmag.com recently spoke to Blake Kozak, Senior Principal Analyst for Smart Home at Omdia, to understand how security systems integrators (SI) can overcome this challenge. Focus on professional solutions alone This is the most obvious solution to the problem – focus on security systems that require the assistance of a professional. Although many devices available in the market are easy to install for customers, things get difficult in large residences and when the risks are high. “Security systems integrators could mitigate the expansion of DIY by focusing on the solutions that require a professional,” Kozak said. “Solutions from the likes of Schneider’s Wiser offering Trane, Honeywell/Resideo or Flo by Moen are focused on pro-channels and often aren’t available directly to consumers. Plus, these solutions are on track to provide more insights to consumers. “Like with Nest Renew, the smart thermostat from Google Nest is finally doing more than integrating with the time of use (TOU) with utilities or monitoring for occupancy. Moreover, these solutions, like from 2GIG and Resideo, are offering products that are designed to be placed front and center in the home through their panels that use facial recognition to portable keypads.” This is a straightforward strategy because there will always be customers who want professional devices or who are not interested in going through the hassles of DIY.

Don’t just offer security offer peace of mind The DIY market is highly fragmented, and consumers must be more engaged with their home to keep it running smoothly. With a professional solution, there is peace of mind for the consumer that it will work, and if it doesn’t, someone will take care of it. “With DIY, some brands are starting to charge for advanced customer support, like Arlo requiring a monthly subscription for telephone support,” Kozak said. “Professionals should point out how fragmented the smart home market is for DIY solutions and the effort required to keep things running. Matter could have a positive impact on this DIY challenge, but tangible results likely won’t be seen until 2023.” Sell DIY solutions too Professionals could also look to start selling more DIY solutions. Countless brands now offer smart home solutions with professional alarm monitoring. “While Nest, Ring, and Arlo have their professional solutions, others should be on the radar as well, like Abode or even Ecobee, which now offers professional alarm monitoring for its sensors and cameras,” Kozak added. “In other cases, Ring is offering video monitoring services, on par with what consumers could get from traditional services. Although there hasn’t been much to show for it so far, the ADT and Google partnership is still presumably moving forward, meaning a very traditional brand is partnering closely with a DIY/IoT brand.” Integrators needn’t dismiss DIY entirely and instead should focus on offerings that require professional support or should find DIY brands to partner with. This would allow them to remain a part of the customer journey from the moment they decide to adopt security solutions. While providing them DIY solutions, you can give them a glimpse of what professional solutions offer, helping them understand the benefits better. Conclusion There are several ways through which security systems integrators can overcome the challenge of DIY solutions. The potential of the home automation sector cannot be denied but navigating through the countless devices in the market is tough. Of course, there will always be customers who want professional service. But an ideal way to go forward maybe a mix of offering DIY and professional service to offer complete peace of mind.

39

a&s INTERNATIONAL

War in Ukraine: What it means for physical security T

he war in Ukraine has entered its third week and is unlikely to end anytime soon. What does this mean for the physical security industry? This note seeks to find that out.

The war in Ukraine began on Feb. 24. Since then, tons of companies have announced suspension of business dealings with Russia, in support of Ukraine. These include security companies. Consider the following:

Source: William Pao (asmag.com)

Axis Communications: “We decided last week to halt all deliveries to the Russia Customs Union (Armenia, Belarus, Kazakhstan, Kyrgyzstan, and Russia) until further notice. In addition to this, we do not accept any new orders or register any new projects in this region. We are closely monitoring the development and as soon as we have any additional information or changes to share, we will do so with those concerned.” MOBOTIX: “MOBOTIX Management Board has decided to immediately stop all business transactions with Russia in support of the world-wide sanctions

40

MARCH 2022

www.asindia.in

Messe Frankfurt supports all sanction measures taken by the (German) Federal Government. Against this backdrop, the Messe Frankfurt Board of Management decided to suspend events of its subsidiary Messe Frankfurt RUS until further notice.” Impact may be minimal The war leaves us in physical security wondering how it might affect our industry. To start off, Russia is not an active exporter in the security arena. “Aside from the few security vendors who are headquartered in Russia, Russia really is not a major manufacturer for security products/components, so the impact on those aspects of the market will likely be minimal,” said Danielle VanZandt, Industry Analyst for Security at Frost & Sullivan. According to VanZandt, while Russia and Ukraine are both countries that do have decently robust security purchases, they are not “central hubs” of activity for many security manufacturers. “As such, the conflict will likely impact any ongoing projects by halting them entirely, but may not have a significant financial impact on security manufacturers,” she said. She added: “Chinese security vendors do have a more prominent presence in Russia and may continue their business there for the time being, but continued pressure for economic sanctions and isolation could change their sales strategies.” Increased spending in surrounding countries What we can expect is some increases in security spending in neighboring countries. “I do expect some limited increases in spending on physical security solutions, such as access control, border security, and perimeter defenses in many of the neighboring countries surrounding the conflict – that is, Poland, Romania, Estonia, Latvia, Lithuania, etc., but much of the increased spending will also be moving towards defense purchases rather than just physical security,” VanZandt said.

condemning Russia’s invasion of Ukraine. We stand united with the rest of the world in our efforts to hold Russian government accountable while we express our deepest respect and sympathy to the citizens of Ukraine.” Of note, Messe Frankfurt, asmag.com’s parent corporation which organizes several security-related trade shows, also announced similar measures: “The Russian invasion of Ukraine poses an unprecedented threat to peaceful coexistence in Europe.

This may also apply to the broader security industry in Europe. “In the short-term, Europe will likely see a slight uptick in larger perimeter security systems, as well as some enhanced cybersecurity systems to fortify themselves in case the crisis expands beyond Ukraine. Countries along the Ukrainian border, such as Poland, Romania, Latvia, Estonia, Lithuania, Finland, and Moldova, will increase their border security spending as a means to protect their border crossings, but also seek out additional identity verification and authentication solutions in response to the influx of refugees from Ukraine and areas neighboring the crisis. This level of spending will stay at this elevated rate until the crisis is resolved, so it remains to be seen when that could subside,” VanZandt said. Some supply chain issues Supply chain may also be impacted, primarily due to longer air-shipping time. “There could be some small supply chain effects to hit the industry, particularly when it comes to products that must be transported via air travel, due to the changes being made to many flight paths to avoid Russian, Belarusian, and Ukrainian airspace. The airspace restrictions in the region and the re-routing of many flight paths, which may cause longer shipping times, might be the most consequential impact on the broader supply chain,” VanZandt said. “Inflation and exchange rate problems, while thought to potentially have been worse once sanctions were introduced, seem to already be subsiding and only really affect the Russian and Belarusian economies at the moment.”

41

Multi-site

Video Monitoring V

ideo monitoring allows clients to monitor a live view of their remote security cameras when they are off-site. The on-site DVRs and NVRs can be set up to send alerts to you, the user, when activity is present that allows the user to log-in to live-stream their surveillance system. Equally as important, the remote monitoring software allows Clients to remotely access recorded video and playback without having to be present where the system is located. This type of video monitoring consists of checking in on cameras at specific times of day for a client, often to ensure that specific events are happening, or specific protocol. This can include, deliveries, guard tours, arrivals or any other type of specific event the client needs checked on.

42

MARCH 2022

www.asindia.in

Multi-Site Video Monitoring a must to Protect Properties

Challenges faced during multi-site video monitoring. As per Gagan Lamba, Vice President, Enterprise Verticals, Prama Hikvision India Pvt. Ltd., the key challenges faced during Remote and Multisite Monitoring Solution are quite comprehensive depending on the locations of the sites. However, the some of the challenges are:

• Securing ATM with top brands, but no one to monitor cameras and health check-up of the system • Lack of Bandwidth in the remote branches. • No alternative solution and monitoring assets on a Real-time basis.

Gagan Lamba

Vice President, Enterprise Verticals, Prama Hikvision India Pvt. Ltd.,

• No specialized products • Lack of trained manpower for Onsite monitoring and lack of trained manpower for Off-site monitoring. • Petty issues of Service from Vendors • Too Many Vendors Involved • No Reports & Recording when needed • Post-Mortem Strategy rather than Preventive Strategy • Managing everyone is a challenge. We offer our Integrated Panel Solution that integrates existing infrastructure in branches and makes useful Standalone System into a preventive system for Real time monitoring. These products are designed specially as per the needs of the bank, the way our ATM Cabinet’s designed especially for Remote Monitoring of ATM and all Hardware that are installed in branches. The ATM can be integrated to our Panel so this way one can avoid the challenge of integration of branches with the bank. We do assist banks in providing specialized vendor, who is trained for these Services and provide a costeffective service that gives return on investment and saves costs to the bank that are being incurred currently in branches and ATM. As an OEM our motto is providing the best- in -class service so we do assist Bank with audit facility of existing infrastructure and also do guide bank with designing of solution in such a way that it consumes minimum amount of bandwidth. This system is easy to maintain with periodic maintenance. The biggest advantage of this system is that at any given point of time the bank officer or CSO can check with his mobile APP, whether the system is working or not. With Hikvision

The E-Surveillance solutions with All-in One solution, where our Video Surveillance, Intrusion, Fire, and all the key security systems are integrated. It is a big step towards multi-site integrated video surveillance monitoring.

Smart Banking Solution bank CSO’s can monitor the branches to prevent incidents of crime. As per Sudhindra Holla, Director – Axis Communications, India & SAARC., Some of the challenges faced during multi-site video monitoring – • Bandwidth Availability – A poor bandwidth can be an obstruction to continuous monitoring and lead to latency or lapses in the footage • Unified Security platform – A poorly integrated unified security platform may lead to more time and labor and coordination in getting access to footage As per Aditya Khemka, managing Director of CP PLUS, the rapidly prevailing video surveillance around the world is persistently benefitting its users through experiencing everything from greater on-site security to increased workplace productivity. But the more heavily businesses, schools, and other organizations rely on these critical technologies to protect themselves and the people they serve, the more complex implementing and maintaining these systems become. “Managing the security of multiple independent sites is usually considered an expensive proposition. Whether there are five, twenty or one hundred sites to secure, hiring onsite staff to monitor and maintain independent systems at each location can be financially draining, or even unrealistic for some companies. There are many aspects to consider such as the infrastructure needed to support the setting up of a command control room, the bandwidth availability against the requirements of the surveillance system to provide stable connectivity. One challenge that immediately arises with this rich data of high-definition cameras, is that it leaves the users scrambling for bigger hard drives and other storage solutions. At CP PLUS though, we understand how essential proper future-proofing in the design and installation of your video surveillance system is. A proper assessment of your current and future needs, weighed against the

43

Aditya Khemka

Managing Director, CP PLUS (Aditya Group)

Artificial intelligence-based solutions are becoming the primary solution to these challenges. Because – when properly trained – technology can consistently and accurately detect objects that human monitors may not, AI-backed video analytics are becoming a de facto standard for law enforcement worldwide.

predicted advances in video and storage technology, can go a long way towards helping you handle the humongous flood of information. Offsite managed servers, in particular, can provide you with unlimited future data storage options by CP PLUS.” Access to and management of the rush of incoming video surveillance data from multiple sites posed a hurdle for businesses and organization spread over boundaries in enforcing proficient security measures and created inefficiencies. The Video Management System (VMS) by CP PLUS was designed with an aim to integrate this data as coherently as possible. Through VMS, the earlier awkwardly strung together systems can now produce perfect results by the system that has crafted with an eye towards standardized, up-to-date software, hardware and connectivity. A single, central platform is much easier to manage as it communicates with various components in a wellorganized, methodical manner that is highly effective. Improvements in technology have greatly expanded the capabilities of security systems across

44

MARCH 2022

various sites, making it easier to achieve multi-site coverage for access control and video with a reasonable investment that offsets the cost of retaining multiple systems in the long run. Further, he says, “Another overwhelming challenge is the amount of time and manpower that must be devoted to watching the collected video feed. These enormous quantities of video data translate into hours of manual review. Artificial intelligence-based solutions are becoming the primary solution to these challenges. Because – when properly trained – technology can consistently and accurately detect objects that human monitors may not, AI-backed video analytics are becoming a de facto standard for law enforcement worldwide. Video surveillance comes with its own requirements and challenges, just like any critical commercial or institutional technology. But understanding the nature of those challenges and taking the proper steps to overcome them can help you enjoy the full benefits of this form of protection. As per Parthesh Dhaggal, Founder, Enceplon., the major challenges are tough terrain, inclement weather, lack of infrastructure in remote areas, menace posed by terrorists, Naxalite, Maoists, militants and anti national elements, want of effective coordination of multiple monitoring facilities, vandalism. Plus, natural

www.asindia.in

Sudhindra Holla

Director, Axis Communications, India & SAARC.

A poor bandwidth can be an obstruction to continuous monitoring and lead to latency or lapses in the footage.

As per Sudhindra Holla, Some of the steps in selecting the right video surveillance system are – • Requirement – One must identify the reason of the surveillance system in order to choose the right type of camera to serve the purpose • Type of Camera – One must identify the right type of cameras best suited in terms of purpose and location

disasters like flood, earthquake and landslide, men material required to safeguard facilities and lengthy time taken for proper analysis pose tough challenges. Selection of the right video surveillance system. As per Gagan Lamba, the integrated solution monitoring remotely through Stateof-the-art Command Centre Software for Health of the Devices and physically monitoring the Integrated IP video surveillance systems along with some emergency sensors is a good choice for multi-site monitoring. We at Hikvision offer a comprehensive range of Integrated Panels specially designed for Branches and ATM in Analog as well as IP, it is an Integrated Panel with compact Design which are suitable for Multi-Site Monitoring. These Panels are integrated with various Alarm Sensors, Panic Switches, Fire Sensors and also Energy Monitoring Devices all the Sensors and Cameras can be remotely monitored by our Multisite Video Monitoring solutions software available in Command Centre as well as Unique Mobile APP. By providing centralised remote surveillance and alarm monitoring, Hikvision has implemented an IP based Video Surveillance and Remote Monitoring Solution for some of the leading Public and Private sector Banks. Remote monitoring helps to monitor and use the video data for business intelligence and betterment of processes for multiple branches and Multi-site scenarios.

• Storage – One must also check the bandwidth that can be integrated as per the demand • Pricing – One must read up and interact with different vendors in the market to comprehend to get the best deal As per Aditya Khemka, “Video surveillance is beneficial in protection against any number of issues as video surveillance systems are becoming more intelligent and effective day-by-day, they can, very well, be used to increase efficiency and productivity in managing a variety of things. But before one evaluates systems, they should determine what type of cameras they want, what type of storage do they need, and what sort of solution

45

Parthesh Dhaggal Founder, Enceplon

The increase in crimes, camera uptime, hard disk not recording, evidence destroyed, power cuts, cable removed, system configuration changed all these are taken care of by our RHMS to ensure seamless business operations.

fits in the specific requirements while considering all the areas they aim to protect. We, at CP PLUS, believe in providing a large degree of customization, which means that you can tailor the system according to your specific needs, whether the system is being installed in a shopping complex or police stations around the city, whether you need a widespread system that can cover multiple locations or a few cameras at your workplace - there’s a solution for everyone”, continues Mr. Khemka. We urge our customers to understand the disparity between indoor and outdoor cameras, as it is quite imperative to grasp the different purposes they serve. While outdoor cameras like PTZ can be used indoors, the reverse can’t be applied as indoor cameras can’t endure the extreme weather conditions or physical damage that outdoor cameras are designed to absorb.

46

MARCH 2022

Some systems are wireless and cloud-based, while others are hardwired into a monitor or recording unit. The number of cameras you need will vary depending on the size and layout of your business and we emphasize on the need for you to consider whether you need infrared cameras, weather-proof casings, or even motion-sensitive recording. As per Parthesh Dhaggal, before deploying the surveillance system care should be taken to ensure that such a system has High Camera Resolution, Night Vision, All Weather Operations, Two-Way Audio, Sufficient Video Storage, Compression For Efficient Storge Management, Wide Field of View, PanTilt-Zoom (PTZ),Emergency Connectivity , Indoor /Outdoor Compatibility, Motion Detection & Analytics, Video recorders’ Compatibility With Cameras, Cloud Storage, the Recording Frame Rate that determines the smoothness of the recorded video all in high quality and Price & Warranty Of the Video Surveillance System Latest transformations for multi-site video monitoring. As per Gagan Lamba, the new technologies and trends like AI, AI Cloud, Deep Learning, IoT -Internet of Things, IoST-Internet of Safety Things and Big Data are empowering multi-site video monitoring. We are implementing new technologies and application like Artificial Intelligence (AI), Deep Learning and IoT to enhance the value of Remote Monitoring Solution, thanks to the AI applications including Face recognition (Rich applications for various scenarios), Data Visualisation (Making operation more data driven) and Behaviour Analysis (Quick response to emergency events).

www.asindia.in

vision pipeline for detection, reidentification, and tracking across multiple cameras without the need for storing the streaming data. On the IoT system side, it provides infrastructure maximize hardware utilization on the edge, orchestrates global communications, and provides system-wide re-identification, without the use of personally identifiable information, for a distributed IoT network. Further, he says, “Recent advances in machine learning, particularly deep learning, have driven the development of more advanced video analytics and surveillance technologies. This includes everything from simple license plate scanners that search for stolen vehicles, to facial-recognition and even pedestrian tracking. We are certain that in the coming time, we’ll keep on ameliorating the current video surveillance technology to further ease the life of the public across the nation and beyond.”

The E-Surveillance solutions with All-in One solution, where our Video Surveillance, Intrusion, Fire, and all the key security systems are integrated. It is a big step towards multi-site integrated video surveillance monitoring. As per Sudhindra Holla, an integrated multi-site management software can ensure system reliability and scalability. It can support more than 1000 cameras in certain situations. As per Aditya Khemka, “with the development of new video technologies such as 4K, 8K, augmented reality (AR), virtual reality (VR), and 360° panoramic video, IP videos are being applied and popularized in multiple sectors. In the era of ultrahigh definition (UHD) video, innovators and early adopters are embracing new technologies that enable a more immersive experience, which is made possible by the new video services mentioned above. Providing that multi-screen integration service is the future of the industry, consumer behavior is constantly being affected. The unique fusion of video synopsis and deep learning solutions enables rapid video review and search, facial-recognition, real-time alerting and quantitative video insights. These real-time alerting capabilities enable organizations to proactively respond to situational changes in their environment.” The Real-Time Edge Video Analytics for Multi-camera Privacy-aware Pedestrian Tracking, as an integrated end-to-end IoT system for privacy built-in decentralized situational awareness, presents novel algorithmic and system constructs to push deep learning and video analytics next to IoT devices (i.e. video cameras). On the algorithmic side, this technology proposes a unified integrated and computer

According to Parthesh Dhaggal, Cloud Video Surveillance System, 4K HDCVI Technology, Multi-Sensor Cameras, Enhanced Power over Ethernet (ePoE), Enhanced H.265 Codecs, PTZ Enhancements, Blockchain, Artificial Intelligence, Augmented Analytics and Quantum Computing, Deep Learning Driven Video Analytics and Cloud Technology are some of the latest transformations in multi-site video monitoring. At Enceplon, we offer latest Multisite Video Remote Health Monitoring Services (RHMS) to various verticals such as BFSI, Education, Retail, Citi Surveillance, Healthcare, Real Estate etc. The benefits of Enceplon’s RHMS are they offer automatic remote service to monitor the health of CCTVs and other surveillance systems 24x 7 , support multi-sites, support many brands of DVR, no initial cost for setting up, work on low bandwidth, provide timely notifications, regular updates, immediate alerts. The increase in crimes, camera uptime, hard disk not recording, evidence destroyed, power cuts, cable removed, system configuration changed all these are taken care of by our RHMS to ensure seamless business operations.

47

Electronic Safes & Electronic Safes & Digital Locks are Essential to Safeguard Valuable Asssets

A

n electronic safe is a certain type of safe with an electronic lock. This can be a burglarresistant safe, a fire-resistant safe or a double-certified safe that offers protection against both. The electronic lock blocks and unlocks the locking mechanism based on a self-selected pin code that is entered. It work the same way as traditional locks but can be opened by entering a 4–6-digit combination on an electronic keypad. The keypad is battery-powered. When the correct combo is entered, it engages the mechanism and allows the handle to turn so that you can open the door of the safe. Whereas when we talk about digital locks, digital locks are highly convenient and secure. With the keyless facility you don’t need to worry about forgetting your keys or even misplacing them. Digital locks have pin, password or fingerprint facility to lock your home and valuables to prevent them from intruders or burglars. The lock system

48

MARCH 2022

works just like a traditional lock – with a latch and a bolt. For example, electronic door locks use something called actuators, which move the bolt of the lock into place so that they door can open. You simply have to trigger the actuator and your door will open. Thus, these electronic safes and digital locks are essential to safeguards valuable assets. Upcoming digital trends of electronic safes and digital locks are still important Electronic safes and digital locks are still important because they offer better safety and security. They provide access to the legitimate owners and deny access to the lock to the unauthorized. They can be operated remotely even from a mobile phone to lock and unlock doors with a simple icon tap. Some offer a web

www.asindia.in

Electronic safes and digital locks are still important because they offer better safety and security. They provide access to the legitimate owners and deny access to the lock to the unauthorized. Parthesh Dhaggal

Founder, Enceplon

app that lets you control things from your desktop or laptop PC. Most apps let you add permanent and temporary users and set access schedules for specific days and times. Setting up burglar alarms is also easier with a digital safe lock. Electronic safes use a keypad and PIN where you press the correct sequence for access. Some safe and locks can be activated using voice commands. Ease of use, easy access, reliability and convenience all make electronic safe and digital lock more important The downsides of using electronic safes digital locks Power failure, possible malfunctions, wear and tear and damaged key pads, pinched data cables, and broken power connections, high installation cost, short life of battery, water and chemical damage to the locks corrodes electronics and power connections, and possibility of forgetting passcodes are some of the downsides. Latest innovations in electronic safes and digital locks. Of late, there are many innovations such as Smartphone Locks, Keyless Touchpads, Finger Print Reader System, voice activation, geofencing, and auto-locking features, biometric locks, Code control for specific hours, interconnecting locks, entry time delays for specified time,mobile phone-based locking and unlocking systems, Wi-Fi Smart Locks. Key fob locks or proximity locks allow you to carry a key fob that will unlock your door as you move towards it and lock it as you move away from it. Similar technology is popular with automobiles; many manufacturers boast “keyless entry”as a feature of newer car models. Some locks even send a text message to your phone when someone enters your home.

49

iDS-2CD8426G0/F-I DeepinView Dual-Lens Face Recognition Camera

DS-2CD2146G1-IS 4 MP Outdoor AcuSense Fixed Dome Camera

iDS-2CD8426G0/F-I adopts advanced deep learning algorithm and powerful GPU to realize instant face detection, capture, and comparison to accomplish face recognition and related alarm triggering. FEATURES == 1/2.8”Progressive Scan CMOS == 1920 x 1080 @30fps == 120dB WDR == H.265+, H.265, H.264+, H.264 == 5 video streams == Face recognition == IR range up to 10 m

Hikvision MinMoe Face Recognition Terminal Model – DS-K1T671 Series

AX-HUB KIT DS-PWA32-KG

FEATURES == 7-inch touch screen, 2 Mega pixel wide-angle lens == Adjusts supplement light brightness manually == Face recognition in dark environment == Face recognition distance: 0.3m to 3m == Suggested height for face recognition between 1.4 m and 1.9 m == Deep learning algorithm == 6,000 face capacity, 5,000 fingerprint capacity, and 50,000 event capacity == Face anti-spoofing == Multiple authentication modes == Face recognition duration < 0.2 s/User; face recognition accuracy rate ≥ 99% == Stand-alone operation == Transmits data to the client software via TCP/IP communication and saves the data on the client software == Capture linkage and captured pictures saving == Manage, search and set device data after logging in the device locally == Connects to one external card reader or access controller via RS-485 protocol

PND-A9081RF 4K AI IR Dome Camera FEATURES == Maximum 4K resolution == [email protected] (Color), 0Lux (B/W, IR LED on) == Day & Night(ICR), WDR(120dB) == H.265, H.264, MJPEG codec, WiseStreamⅡ == Video Analytics based on AI • Object detection and classification(Person, Face, Vehicle, License Plate) • Face mask detection, Social distancing detection • Attribute, BestShot == Modular structure for easy installation == Requires camera firmware v1.41.03 or later to use Face Mask Detection == System requirements • SSM v2.10.8 or later, Genetec plugin v1.0 or later, Milestone plugin v1.0.2 or later

50

MARCH 2022

FEATURES == 1/2.7” (4 MP) Progressive Scan CMOS == 2688 x 1520 Resolution @ 30 fps == EXIR 2.0 Range Up to 100 ft (30 m) == 2.8 mm, 4 mm, or 6 mm Fixed Lens == H.265+, H.265, H.264+, H.264 == 120 dB True WDR == MicroSD Card Slot Supports 128 GB

www.asindia.in

1. AX-HUB with in-built GPRS Module, Lan Module & Wi-Fi Module. 2. Pet Immune Motion Sensor 3. Magnetic Contact 4. Keyfob 5. HikConnect Mobile App + SMS + Auto Dialling Voice Call 6. Supports Web Browser for integrating Hikvision IP Cameras with AX-HUB. IP Cameras to be purchased separately. FEATURES == Voice guiding for ease of Operations == Ease of Programming Via Web / APP == Two-way wireless Communication == 32 wireless inputs, 8 keyfobs, 2 wireless sirens == In-built GPRS + SMS + Voice Dialing facility == Supports 2nos of Hikvision IP Cameras for Video verification == Supports viewing events Video Via Mobile APP == Transmission distance 800m in open area == 128-bit data encryption == In-built Battery Back-up up to 12Hrs == Hik-Connect Mobile APP == 3rd Party CMS software compatibility

PNM-9000QB 2MP x 4CH Remote Head Camera FEATURES == 2MP x 4CH == HDMI - Single/Quad view support == WDR 120dB, WiseStreamII == Defocus detection, directional detection, motion detection etc == Max 30fps@2MP == H.265, H.264, MJPEG

PRODUCTSHOWCASE SHOWCASE PRODUCT Standard 5MP Motorized Illustra Standard V/F IR Smart Bullet4MP Illustra Standard 4MP Box Camera Network Camera Box TheCamera Illustra Standard Box Camera by American

FEATURES The Illustra Standard Box American Dynamics captures highCamera quality by colored Images == 5MP resolution H.265 Dynamics captures high quality colored Images == 30fps@5MP, 60fps@2MP == True day / night FEATURES == to Light 70m IR distance Environment with Smart IR == Up Low Conditions FEATURES == Auto focus by motorized V/F lens ==Low 4MP resolution ==== Light Conditions Environment True WDR, up to 120dB ==4MP 30resolution fps high ==== 3D DNR, HLCframe & BLCrate ==30 140dB WDR ==== fps high frame rate Smart codec by ROI ==140dB PoE WDR ==== 2-way audio & alarm in/out ==PoE 3D DNR storage ==== Onboard ==3D Wide of applications. Advanced intelligent video analytics ==== DNR varieties Facevarieties detection / capture ====Wide of applications. == Smart non-false alarm == IP67 / IK10

Performance Lite Camera: CP-UNC-VC41L5-VMDS Performance Lite &Camera: 2MP IP IR Bullet Dome Camera 4MPIPFull HD WDR IR Vandal 2MP IR Bullet & Dome Camera Dome Camera - 50Mtr. FEATURES

== 2MP full real time recording FEATURES FEATURES PoE supply ====2MP fullpower real time recording == 1/2.7” 4Megapixel DNR, DWDR PS CMOS Image ====PoE3Dpower supply == Sensor (6.858cm) night function == 3DTrue DNR,day DWDR == 25/30fps@4M(2688x1520) Upday to 30m distance ====True nightIRfunction == H.265+ and H.264+ triple-stream encoding stream ====UpSupports to 30m IRtriple distance == WDR(120dB), Day/Night(ICR), 3D-DNR, ROI, AWB, AGC, BLC == Supports triple stream == IR Range of 50 Mtrs, IP67, IK10, Micro SD Card, PoE == Support Starlight Technology == Mobile Software: iCMOB, gCMOB == CMS Software: KVMS Pro

PRODUCTSHOWCASE SHOWCASE PRODUCT

Illustra Standard 2MP IR Illustra Standard 2MP IR Network PTZ Camera Network PTZ Camera Standard 5MP Motorized EspeciallyStandard designed for deployment in securityIllustra 4MP Illustra Standard 4MP V/F Smart Dome Especially designed for deployment in capabilities securitycritical environments. Powerful PTZ BoxIRCamera critical environments. Powerful PTZ ofcapabilities Box Camera in terms ofCamera speed, agility and ease deployment Network The Illustra Standard Box Camera by American in terms oftospeed, agility and ease of deployment are vital locate, track and zoom quickly onto the The Illustra Standard Box Camera by American Dynamics captures high quality colored Images FEATURES aresecurity vital tocaptures locate, track and zoom quickly onto the situation area. Dynamics high quality colored Images == 5MP resolution H.265 security situation60fps@2MP area. == 30fps@5MP, FEATURES == True day / night FEATURES FEATURES == Up Low Conditions Environment == to Light 50m IR with Smart IR 2MP (1920 x distance 1080)Environment resolution FEATURES ==== Low Light Conditions == 4MP resolution == Auto focus by motorized V/F lens == 36X Optical Zoom == 2MP (1920 x 1080) resolution ====4MP resolution 30 fps high frame rate ==36X True WDR, up to 120dB IR Distance == Optical Zoom ==== 30 200m fps high frame rate == 140dB WDR 3D DNR, HLCWDR & BLC ==140dB 120dB True ==== 200m IR Distance == == Defog PoE WDR ==PoE Backlight Compensation ==== 120dB True WDR == == Triple 3D DNR streams ==3D Optical Defog ==== Backlight Compensation == DNR varieties == Smart Wide applications. == codec byofROI Hi-PoE / 24VAC power supply ====Wide Optical Defog == varieties applications. == 2-way audio of & alarm in/out IP67,/ IK10 ====Hi-PoE 24VAC power supply == Onboard storage == IP67, IK10 == Advanced intelligent video analytics == Face detection / capture == Smart non-false alarm == IP67 / IK10

PRODUCTSHOWCASE SHOWCASE PRODUCT

Illustra Pro Gen3 Mini-Dome IllustraPro Standard 2MP IR Illustra Gen3 Mini-Dome Standard Illustra 2MP Available in4MP a range ofIRresolutions and lens IllustraStandard Standard 4MP Network PTZ Camera Available inthe aGen3 range of resolutions lens options, Mini-Dome can be and added to a V/F IR Standard Turret Network Network PTZ Camera Illustra 4MP Box Camera Especially designed forin deployment inand securityoptions, Gen3 Mini-Dome be added to a varietythe of deployments bothcan mediumlargeCamera Especially designed forBox deployment securityBox Camera critical environments. Powerful PTZ capabilities The Illustra Standard Camera byinAmerican variety of deployments in both mediumand largesized facilities. critical environments. Powerful PTZ The Standard Box Camera by American FEATURES in Illustra terms of speed, agility and ease ofcapabilities deployment Dynamics captures high quality colored Images sized facilities. in terms ofresolution, speed, agility and ease ofquickly deployment == 4MP H.265 Dynamics captures high quality colored Images are vital to locate, track and zoom onto the FEATURES == 30fps @ 4MP areFEATURES vital to situation locate, track and zoom quickly onto the security == Up today 8 MP @30 area. fps FEATURES == True / night security area. Conditions Environment Quad Streaming ====UpLow to situation 8 Light MP @30 fps FEATURES == Up to 50m IR distance ==Low 4MP resolution Integrated IR Range Quad Streaming ==== Light Conditions Environment Wide Dynamic FEATURES ==4MP 30 fps high rate 120dB True WDR IR xframe == resolution FEATURES == HLC &(1920 BLC ==Integrated 2MP 1080) resolution ==30 140dB WDR Integrated Video Analytics 120dB True WDR ==== fps(1920 high rate xframe 1080) resolution Triple streams ==2MP 36X Optical Zoom ==140dB PoE Proprietary Intellizip ==== WDR Smart codec byAnalytics ROI Technology 36X Optical Zoom ==Integrated 200m IRVideo Distance ==Proprietary 3D DNR IP67, ==== Intellizip PoE power supply 200m IRIK10 Distance ==PoE 120dB True WDR Technology ==3D Wide varieties ofvideo applications. Basic intelligent analytics IP67, IK10 ==== DNR True WDR ==120dB Backlight Compensation IP67/IK10 ==== varieties of applications. Backlight Compensation ==Wide Optical Defog NDAADefog Compliant ==== ==Optical Hi-PoE / 24VAC power supply ====Hi-PoE / 24VAC power supply IP67, IK10 == IP67, IK10

50 50

Standalone Battery Operated Standalone Battery Operated Smoke Detector Smoke Detector Performance Lite Camera: CP-UNC-TC41ZL6-VMDS Performance Lite Camera:FEATURES 2MP Full IP IRHD Bullet & Dome Camera 4MP Network == Low power consumption – 2years FEATURES 2MP IP IR BulletWDR & Dome Camera extended battery life- –60 ==IRLow powerCamera consumption 2years Bullet Mtr.

FEATURES ==extended Low recurring battery cost life – Operates on FEATURES ==Low 2MP full realcost time– recording 2 AAA batteries ==FEATURES recurring Operates on ====2MP fullpower real time recording PoE supply ==2 AAA Cable and Wire free – Image Do it yourself batteries 1/2.7” 4MP PS CMOS Sensor ==== PoE power supply == 3D DNR, DWDR ==Cable Plugand & Play with Inbuild encoding ==== Wire free – Do it yourself H.265+ and detector H.264+ triple-stream ====3D DNR, DWDR True day night function alarm buzzer ====Plug & Play detector with Inbuild 4MP(2688 1520)@30fps ====True nightxIRfunction Upday to 30m distance alarm buzzer WDR(120dB), Day/Night(ICR), 3D-DNR, ROI, AWB, AGC, BLC, HLC ==== Up to 30m IR distance == IR Supports triple stream Range of 60 Mtrs. ====Supports triple stream == 2.7mm- 13.5mm Motorized Lens == Support Starlight Function == Micro SD Card, IP67, IK10(optional), PoE == Mobile Software: iCMOB, gCMOB == CMS Software: KVMS Pro

Biometric Terminal Series: Biometric Terminal Series: Standalone Battery Operated FEATURES Standalone Battery Operated Performance Lite Camera: CP-NNR-4K332R4-16P== HON-BIOEM-500TA FEATURES Smoke Detector Performance Lite Camera: Smoke Detector 2MP IP IR Bullet & Dome == DISPLAY 2.8 inch TFT == HON-BIOEM-500TA 32 Ch. H.265+ 4K AIScreen Camera ==DISPLAY Fingerprint template 500 Camera == inch TFT Screen 2MP IP IR 2.8 Bullet & Dome FEATURES Video Recorder Network ==Fingerprint ID Card Capacity == template500 500 FEATURES

FEATURES == Low power consumption – 2years Log Capacity 50,000 == Card Capacity 500recording ==== Low power consumption ==ID 2MP full real time FEATURES extended battery life – 2years ==Log Communication TCP/IP ==FEATURES Capacity 50,000 extended battery life PoE power supply ==== full real time recording ==2MP Low recurring cost Operates on Up to 32 channel IP –camera input == Interface USB| == Communication TCP/IP ====PoE Low recurring cost – Operates on 3D DNR, DWDR == supply 2 power AAA batteries == H.265+/H.265/H.264+/H.264 codec decoding == BIS certified ====2Interface USB| AAA batteries True day night ====3D DNR, DWDR Cable and Wirefunction free – Do it yourself Max 320 Mbps bandwidth ==Cable HON-BIOMI-5000TA & itHON-BIOEM-5000TA ==== BIS certified == and Wire free – Do yourself Up to 30m IR distance ====True day night function Plug Play detector withwith Inbuild Up to &16 face databases 10,000 face images in total DISPLAY 2.8 inch TFT Screen ==== HON-BIOMI-5000TA & HON-BIOEM-5000TA == Play with Inbuild ==Plug Supports triple stream ==== Up to&to 30m IRdetector distance alarm buzzer Up 32ch picture Fingerprint template 1000 face recognition ====alarm DISPLAY 2.8 inch TFTstream Screen buzzer ====Supports stream Up to 20triple Face pictures/sec ID Card Capacity 1000 ====Fingerprint template 1000 processing HDMI ==ID Simultaneous Log ==== CardCapacity Capacity100,000 1000 and VGA up to 4K output Support 4 SATA Ports, ==Log Communication TCP/IPup to 12TB Each, 3 USB Ports, 1 eSATA Port, 16 PoE Ports ==== Capacity 100,000 Support 5/6/10 ==Communication InterfaceRAID USBTCP/IP ==== Support ==Interface MI fareUSB &Multi-brand EM card network cameras ==== ONVIF conformance ==MI BIS, & FCC certified ==== fare CE &Version EM card2.4 Mobile Android, iOS ====BIS, CE & Software: FCC certified

MARCH 2020 www.asindia.in www.asindia.in MARCHFor 2020 Inquiries on Product Showcase, Please Contact us - [email protected]

51

VIDEO INSIGHT 7 Video Insight 7 is a powerful yet easy-to-use enterprise Video Management platform that allows organizations in education, law enforcement, healthcare, commercial, and transportation the ability to deploy a customized and robust security surveillance system. New to version 7 is enhanced functionality with our new plug-in architecture which allows even greater scalability and improved feature sets.

MonitorCast

ACCESS CONTROL i-PRO Monitor Cast AccessBY Control

Video Insight 7

FEATURES Video surveillance is just one of the components needed to achieve a secure environment. Another main element of any safety roadmap should be an access control system that enables its users to quickly and efficiently set schedules, manage users, produce reports, and lock down the entire site in the event of an emergency. Video surveillance is just one of the components needed to achieve Monitor Cast 4 is anAnother enterprise-grade access control application that comes a secure environment. main element of any safety roadmap Powered by Mercury should be an access control system that enables its users quickly integrated with Video Insight 7 to provide a to seamless, unified security solution that and efficiently set schedules, manage users, produce reports, and lock allows officials to increase readiness and downsecurity the entire site in the event of an emergency. MonitorCast 4 isquickly respond to incidents.

FEATURES Video Insight 7 is a powerful yet easy-to-use CLIENTS enterprise Video Management platform that allows Organizations in education, law enforcement, healthcare, commercial, and transportation the ability to deploy a customized and robust security surveillance system. New to version 7 is Enhanced functionality with our new plug-in architecture which allows even greater scalability and Poweredfeature by Mercury improved sets.

Powered by Mercury

MonitorCast

MonitorCast

ACCESS CONTROL BY i-PRO

N

EW

VI Monitor PLUS

VI Web Client

VI Monitor for Mac

VI Mobile

VI TV+

ACCESS CONTROL BY i-PRO

Panasonic WV-SFV631L

A-54-V2 Hallway

B-51 - Tech Support

A-34W – Hallway

an enterprise-grade access control application that comes integrated

== Streamlined Client (VI MonitorPlus) == Included Access Control (MonitorCast) == H.265 Support == Expanded Functionality Via New Plugin Architecture

== with Easy use,7 browser-based with extremely scalable Videoto Insight to provide a seamless, management unified security solution Simple Dashboard Display. allowsconnections security officials to increase readiness and quickly respond that client Door Alarm on the Facility Map to incidents. == Door licenses are bundled when Mercury controllers are purchased from i-PRO Easy re-occurring to use, browser-based management == ■ No fees or clientwith license fees extremely scalable client connections == Fully integrated into Video Insight video management software ■ Door licenses are bundled when Mercury == Access platform from controllers the are purchased from i-PRO web or mobile clients to secure your facility surveillance is just one of the components needed to achieve Video anywhere ■ from No re-occurring fees or client license fees a secure environment. Another main element of any safety roadmap ■ Fully integrated into Video Insight video shouldmanagement be an access control system that enables its users to quickly software and■efficiently set schedules, manage users, produce reports, and lock Access the platform from web or mobile clients secure your site facility downtothe entire infrom theanywhere event of an emergency. MonitorCast 4 is an enterprise-grade access control application that comes integrated with Video Insight 7 to provide a seamless, unified security solution that allows security officials to increase readiness and quickly respond to incidents.

Easy User Import & Creation

Panasonic WV-SFV631L A-54-V2 Hallway

B-51 - Tech Support

Video surveillance is just one of the components needed to achieve a secure environment. Another main element of any safety roadmap should be an access control system that enables its users to quickly and efficiently set schedules, manage users, produce reports, and lock down the entire site in the event of an emergency. MonitorCast 4 is an enterprise-grade access control application that comes integrated with Video Insight 7 to provide a seamless, unified security solution that allows security officials to increase readiness and quickly respond to incidents.

Panasonic WV-SFV63 A-54-V2 Hallway

B-51 - Tech Support

A-34W – Hallway

Customizable System Reports

Simple Dashboard Display. Door Alarm on the Facility Map

■ Easy to use, US browser-based management with CONTACT extremely scalable client connections [email protected]

■ Easy to use, browser-based management with extremely scalable client connections

■ Door licenses are bundled when Mercury i-PRO Multi-Sensor Camera controllers are purchased from i-PRO

■ Door licenses are bundled when Mercury WV-X5550LT controllers are purchased from i-PRO

■ No re-occurring fees or client license fees FEATURES Easy User Import & Creation ■ Fully integrated VideoSolutions Insight video NEW i-PROtheMULTI-SENSOR CAMERA Panasonic i-PRO into Sensing is excited to announce new i-PRO multi-sensor Panasonic i-PRO Sensing Solutions is excited to announce the new i-PRO multi-sensor camera. This discreet new management softwarenew multi-sensor camera camera. This discreet with IR LED combines a small form multi-sensor camera with IR LED combines a small form factor with powerful AI capabilities and outstanding image quality to bring you a sleek, streamlined look with the power of the future. ■ Access thepowerful platform AI from web or mobile factor with capabilities and clients outstanding image quali¬ty toAI processor bringandyou sleek, The new i-PRO multi-sensor camera comes with a built-in enables a advanced analytics at the edge. With options such as three or four sensors and clear or smoke domes, it is a proactive video surveillance device that can detect to secure your facility from anywhere streamlined look with the power of the future. people and vehicles and automatically optimize images. It also offers wider coverage with a larger tilt range than other multi-sensor cameras on the market, and it provides extreme visibility with high-quality resolution in 4MP, 6MP, and 4K. Plus,with it is IR LEDa supported, which allows to see in very dark scenarios. These combined features allow security proThe new i-PRO multi-sensor camera comesfessionals built-in AI you processor and enables once relegated to just monitoring screens to use their time more effectively and rely on the edge-computing device to notify them when a scene requires their attention. advanced analytics at the edge. With options such as three or four sensors and clear The new i-PRO multi-sensor camera is the thinnest network camera available, which makes it one of the most discreet cameras on the market, blending seamlessly its surroundings. Easy people to install, this new multi-sensor camera has a Powered by Mercury or smoke domes, it is a proactive video surveillance device thatintocan detect and hinged hanging system that locks in place to create a hands-free environment while on a ladder. When there are multiple Customizable System Reports cameras to be installed, this new easy installation feature saves time and, subsequently, money. vehicles and automatically optimize images. It also offers wider coverage with a larger Featuring industry-leading FIPS 140-2 level 3 encryption and level 3 compliance, the new i-PRO multi-sensor camera offers resistant technology, identity-based authentication, strong encryption and an extra layer of security that protects tilt range than other multi-sensor camerastamper on the market, and it provides extreme critical security parameters on the device. These security features mean the new i-PRO multi-sensor cameras can be used for all government and law enforcement projects. And since FIPS is now also being recommended for health care and visibility with high-quality resolution in 4MP, 6MP, and isforIR LED educational facilities, these4K. camerasPlus, are a great it option projects acrosssupported, multiple verticals. With a thin, sleek design, AI capabilities and industry-leading compliance, i-PRO’s new multi-sensor camera takes video which allows you to see in very dark scenarios. These combined features allow security surveillance into the future. i-PRO…setting the new standard in surveillance cameras. CONTACT US pro¬fessionals once relegated to just monitoring screens to use their time more [email protected] effectively and rely on the edge-computing device to notify them when a scene requires Visit our website to learn more: their attention.

■ No re-occurring fees or client license fees FEATURES ■ Fully integrated into license Video Insight Occupant image and plate video simultaneously in 24/7. management software The WV-X5550LT captures clear images of occupants ■ Access the platform from web or mobile on one channel and license plates on theclients other, even in the to secure your facility from anywhere most challenging environments. It helps reduce investigation time, as law enforcement can recognize the license plate of suspected vehicles and Powered bytheMercury details inside vehicle. == Dual source” capturing function - Simultaneously capturing == Capture clear image == High Reliability == Usability

Video surveillance is just one of the components needed to achieve a secure environment. Another main element of any safety roadmap should be an access control system that enables its users to quickly and efficiently set schedules, manage users, produce reports, and lock down the entire site in the event of an emergency. MonitorCast 4 is an enterprise-grade access control application that comes integrated with Video Insight 7 to provide a seamless, unified security solution that allows security officials to increase readiness and quickly respond to incidents.

Video surveillance is just one of the components needed to achieve a secure environment. Another main element of any safety roadmap should be an access control system that enables its users to quickly and efficiently set schedules, manage users, produce reports, and lock down the entire site in the event of an emergency. MonitorCast 4 is an enterprise-grade access control application that comes integrated with Video Insight 7 to provide a seamless, unified security solution that allows security officials to increase readiness and quickly respond to incidents.

MonitorCast

Simple Dashboard Display Door Alarm on the Facility M

Easy User Import & Creatio

MonitorCast

ACCESS CONTROL BY i-PRO

ACCESS CONTROL BY i-PRO

Customizable System Repor

CONTACT US

[email protected]

i-pro.com/us/en/surveillance

Panasonic WV-SFV631L A-54-V2 Hallway

B-51 - Tech Support

Simple Dashboard Display. Door Alarm on the Facility Map

■ Easy to use, browser-based management with extremely scalable client connections

■ Door licenses are bundled when Mercury

Lockwood Electricfrom Mortice controllers are purchased i-PRO ■ No re-occurring fees or client license fees Lock 3570 series

Simple Dashboard Display Door Alarm on the Facility M

■ Door licenses are bundled when Mercury

controllers are purchased from i-PRO Incedo solution

■ No re-occurring fees or client license fees

■ Fully integrated into Video Insight video FEATURES ==management Manage allsoftware your security and access the platform from web or mobile clients ■ Access systems in one place to secure your facility from anywhere == Migration between all Incedo options is free and seamless == Both wired and wireless reader can be integrated == Choose local or cloud management; cards, tokens or mobile keys == Work smarter with real-time control and personalized access

CONTACT US

Easy User Import & Creation

Customizable System Reports

■ Fully integrated into Video Insight video

management software FEATURES == Designed with flexibility ■ Access the platform from webinormind mobile clients ==to secure One Locks coversfrom all Functions your facility anywhere == Easy to configure onsite == Dead latched and locked == Door position/Reed switch == Dual key override monitoring == Request to exit/REX == LED indication

CONTACT US

[email protected]

MARCH 2022

B-51 - Tech Support

A-34W – Hallway

■ Easy to use, browser-based management with extremely scalable client connections

52

Panasonic WV-SFV63 A-54-V2 Hallway

[email protected]

www.asindia.in

Easy User Import & Creatio

Customizable System Repor

BG300 Barrier Gate FEATURES == The fastest operating speed is 1.5s, the speed can be adjusted according to different boom arm length. == Digital control monitoring, support delay automatic close functions. == High safety, support power off manually rise boom arm, anti - smash functions. == The position of the angle of rise / fall can be adjusted, and the digital encoder is adopted to limit the position automatically, replacing the traditional limit structure, and the position control is accurate. == The barrier boom will rebound when it is blocked. == Invertibility left and right direction, simple and compact transmission mechanism, easy to install on site.

LH3000 RFID Hotel Lock FEATURES == With advanced 13.56mhz Mifare-1card technology == American standard mortise with5 latches == Stainless steel housing with the colorof sliver == With professional hotel lock managementsoftware - single click install == Audit trail records the latest224 lock transaction == With warning beeps in low battery power == Backset is 62.5mm

NAS N300 series FEATURES == Industry Standard 3.5-inch FF with SATA 6Gbit/s Interface == 9-disk helium-sealed CMR having FC-MAMR technology == 7200rpm and 512 MB Cache delivers a consistent high level of performance with a sustained transfer rate of 268 MB/s. == 180 Total TB Transferred per Year Workload Rating == Rotational Vibration (RV) Sensors for eliminating the possibility of ‘knock-on’ vibration in multi-bay NAS configuration systems. == Support multi-RAID systems with up to 8 hard disk drives. == 3 years of warranty.

LPRC300 license plate recognition camera FEATURES == Embedded Deep Learning LPR Algorithm == AI Chip with 0.5 TOPS == Embedded Allowlist and Blocklist == ONVIF Protocol, for Video Surveillance == Free SDK and push protocol supporting 3rd-party integration. Card Holders Capacity-30,000 == 3 Mega pixel camera

ML300 Fingerprint keypad smart lock with Bluetooth communication. FEATURES == No Drilling Required Directly replace the existing lever or knob of a single-hole door == Remote Control Unlock and manage the lock from anywhere with the optional gateway == Capacitive Fingerprint Sensor Fast verification for dry and rough fingers == Random Passcode Secure your passcode from prying eyes == Temporary Access Share digital keys valid for specific time to friends or guests == Voice Control Work with Amazon Alexa and Google Assistant == Smart Alerts Receive real-time notifications of low battery, illegal attempts and hijack == Reversible Design Fit for all door opening directions

Surveillance Hard Disk Drive S300 Pro series - HDWTxxx FEATURES == Choice of 10TB, 8TB, 6TB Storage Capacity. == Support for up to 64 HD Cameras. == MTTF 1M hours. == 7200 Rpm, 256 MB dynamic Buffer. == 180 Total TB transferred per year work load rating. == Designed for 24x7 operation and up to 600K Load/unload cycles. == Rotational Vibration (RV) sensors for higher reliability in RAID/multi-HDD platforms == 3 years of standard warranty.

Applications: == Branch-office / Remote-office Networked File Storage == Centralized Surveillance data storage systems == File and Object storage solutions == Archiving and data back-up == Consumer NAS file storage == Private cloud server and storage

For Inquiries on Product Showcase, Please Contact us - [email protected]

53

8MP Professional Series Dome IP Camera

8MP Project Series Bullet IP Camera

FEATURES == Clear Images at 0.01 Lux == 4K Recording == H.265 Compression Technique == In-built Microphones == Adaptive and Smart Streaming == Motion, Intrusion & Tripwire Detection == Signal-to-Noise Ratio (>70dB) == IP67 and IK10 Compliant

FEATURES == Clear Images at 0.01 Lux == 4K Recording == H.265 Compression Technique == Adaptive and Smart Streaming == Motion, Intrusion & Tripwire Detection == Signal-to-Noise Ratio (>70dB) == IP66 and IK10 Compliant

Matrix COSEC ATOM RD100K

Matrix COSEC VEGA CAX

FEATURES == Multi-Credential Support - PIN, RFID Card, and Mobile Authentication == Multiple Interfaces - Wiegand, RS-232, Exit Switch Interface, Door Lock Relay == Certified protection against Ingress and Vandal == Third-party Integration

FEATURES == Multiple User Credential - BLE, RFID, PIN, FACE with IP Camera Integration == Massive Storage Capacity - 50,000 Users Profiles, 5,00,000 Events == Multiple Connectivity Options - Ethernet, PoE, Wi-Fi, Mobile Broadband == Auxiliary Ports for Integration with Alarms and Panels == Built-in APIs to Communicate with Third-party Software

Video Doorbell:

Video Door Phone:

The Smart Wi-Fi Video Door Bell by Ozone is compatible with Android and iOS mobile devices. It comes with a two-way model to let you communicate with ease and comfort. The wire-free feature enables neat & easy installation without any worry for wiring expense and trouble. Moreover, it has an in-built 6700mAh battery to provide a decent three months power backup in an extended power cut.

The Video Door Phone by Ozone is compatible with Android and iOS mobile devices. It comes with a two-way model to let you communicate with ease and comfort. The phone features infrared LED lights to enable night vision and provide additional protection. A single unit allows security to multiple apartments. The indoor screen comes with a touchpad to let you operate it with ease and familiarity. FEATURES

FEATURES == == == == == == ==

2MP high-definition camera Infrared LED illuminator for night vision Motion detection IP65 weatherproof Google Nest and Alexa voice assistant Dual storage capacity i.e., 128GB SD card & cloud storage Accessible through OzoLife mobile application

54

MARCH 2022

www.asindia.in

== == == == == == ==

1080P HD display Motion sensor Instant & accurate alerts IP65 weather protection Custom ringtone Feather touch button Snapshot video accessibility

PRODUCT SHOWCASE

ALGATEC Single Series ALGATEC Stainless Steel EM Lock with Timer & Exit Button Buzzer - UL275TB-SL FEATURES UL275TB-SL is a Double 600lbs Throw. EM Locks with Time Delay Function (TDF) & Buzzer. The aim is == Single Pole to meet fire/life safety applications by providing an auxiliary locking mechanism. It is also == Solid stainless-steel faceplate. suitable for access controlled secure areas which == Optional faceplate sizes &available to suitwithin your buildings requirement for require 2-tier access control feature in& aUSsingle device. European standard.

PRODUCT SHOWCASE Surveillance Hard Disk Drive V300 series - HDWUxxx ALGATEC Single Series ALGATEC 1200lbs Water EM Lock with Timer & FEATURES Proof Switch == 24x7Reed always-on operation Buzzer - UL275TB-SL == Up to 3 TB Storage Capacity Monitoring EM Lock – EXT545-SL

== Optional button available: Press Exit Button / Infrared No Touch Exit Button. FEATURES == Vandal resistant. == Time Delay Function - Enable setting of door re-lock time via Time Adjustor. == Buzzer – Sounds when magnet does not detect Armature Plate after a specific time set. == Integrated Lock Status Monitoring Features (LSMF) with built-in LED & sensor. == Dual Voltage Operation-12Vdc/24Vdc. == Zero residual magnetism, easier and more cost-effective installation.

== 5700/5940 64EM MBLocks Cachewith Time Delay Function (TDF) & Buzzer. The aim is UL275TB-SL is a rpm, 600lbs == SATA up tosafety 6 Gb/s FEATURES to meet fire/life applications by providing an auxiliary locking mechanism. It is also == Format (AF) force. 512e Sector Length == Advanced Up for to 1200lbs holding suitable access controlled & secure areas within buildings which require 2-tier access == power == Lower Zero Residual Magnetism control feature in a consumption single device. when using low spin and adaptive power mode control == allowance 0-70°C == Temperature Dual Voltage Operation-12Vdc/24Vdc. == for consumption DVR/NVR andatVideo Editing Systems. == Suitable Low power only 420mA (

Get in touch

Social

© Copyright 2013 - 2024 MYDOKUMENT.COM - All rights reserved.