Rev_Final_a&sINDIA March 2023_Emagazine Flipbook PDF

Rev_Final_a&sINDIA March 2023_Emagazine

4 downloads 115 Views 11MB Size

Recommend Stories


March 2016
Marzo / March 2016 EXCELENTE Marzo / March 2016 Cover marzo.indd 1 18/02/2016 12:14 No.130294 Patek Philippe.indd 2 17/02/2016 09:26 No.13029

Ausias March, en castellano
Ausias March, en castellano Por Manuel Alvar 1 Nunca agradeceremos bastante a Rafael Ferreres el habernos entregado todo Ausias March en castellano 1

Story Transcript

Best Security Boosts Customers’ Confidence in

BFSI

STAY UPDATED

Multi-Site Video Monitoring is a Must to Avert Loss Well-protected payment gateways are of paramount importance Electronic safes & digital locks ensure utmost security

GO MOBILE

victor and VideoEdge 6.1 Enhanced capability for AI-driven forensic search enables operators and investigators to quickly find an object-of-interest based on type and attribute in victor and VideoEdge v6.1.

Phone: +91 124 6032423 Email: [email protected] www.tycosecurityproducts.in

© 2023 Johnson Controls. All rights reserved.

Door Controllers Elegantly simple and cost effective door controllers for access control Take advantage of the convenience and cost effectiveness of cloud powered access control. Remotely lock and unlock doors from any computer or smart phone. Monitor real-time door activity with integrated video surveillance and intelligent alerts. Manage doors, users and schedules across your entire organization – all from one browser.

Phone: +91 124 6032423 Email: [email protected] www.tycosecurityproducts.in

© 2023 Johnson Controls. All rights reserved.

Open More with HID Mobile Access®

Open More with HID Mobile Access in the banking and financial sector with the convenience of multiple credentials on your employees’ smartphone or wearable, eliminating the need for physical keys or cards that can be lost or stolen.

hidglobal.com

Credentials are managed centrally, in real-time, through a robust online platform which is internationally accredited to global information security management standards. This seamless digital experience further supports financial institutions in achieving their environmental, social and governance goals. © 2023 HID Global Corporation/ASSA ABLOY AB. All rights reserved.

CONTENTS

40

12

Vertical Market

28

View Point

30

Special Feature

50

Technology

64 04 06 68

4

MARCH 2023

12

BFSI

Payment Apps

Multi-site Video Monitoring

Cloud Storage

30

Case Study Sovereign Safe Controls Access to their Safety Deposit Vault through Efficient Matrix Security Solutions

Contents Editor’s Note Advertiser Index

www.asindia.in

28

40

Product Exploration

62

a&s INTERNATIONAL

56

Tech Insight

Electronic safes & digital locks

Security a major concern as India’s banking sector expands

Quantum Announces Partnership with WaitTime for Real-Time Crowd Intelligence Using AI software and Video Surveillance Data Burglary threats clouding your mind? Secure your bank with solutions that provide assurance and peace of mind with Texecom

48

Budget

58

Launch Pad

Union Budget 2023-24 Post Budget Reaction

Hi-Tech Access Control System Matrix Cosec ATOM RD100K Reader: Simplifying Access Control for Organizations Johnson Controls releases web-based event management tool C•CURE IQ Security Client

65

Show Review Matrix Comsec felicitated with ELCINA DEFENNOVATION Award 2022 for Excellence in Manufacturing ZKTeco India Business Meet at Guwahati, 2023

08 09 42 11

Reader’s Feedback Corporate News Product Showcase News Feature

MARCH 2023 | www.asindia.in

5

Transformation: Trends Transforming the BFSI Industry’s Future

W

hen the pandemic hit, most financial institutions entered a crisis mode of building digital capabilities that allowed consumers to bank without branches. In 2023, banks and credit unions must rethink the definition of ‘digital banking,’ with the application of data, analytics, technology, innovation and people that will transform customer experiences.

a&sINDIA, published by Oil Asia Publication, is a monthly professional publication for channel players in the Indian electronic security industry. It serves importers, distributors, OEM/ODM searchers, system integrators and other product purchasers to update product sources and identify development of CCTV, Digital Surveillance, Access control biometrics, intrusion alarm, Intercom/video door phone, home automation and other fields related to electronic security. a&sINDIA also covers active and passive fire protection and emergency rescue management issues. It contains articles on cutting-edge products, technical applications and safety code issues in India and many other themes of interest to fire safety professionals.

Banks across the world are deploying this kind of technology as a prelude to a future that is increasingly driven by technology- a future characterized by instant payments, anytime-anywhere services, individualized products, and virtual currencies, and perhaps run by invisible banks.

Manish Gandhi

Graphic Designer Sarvesh Jha

While virtually all financial institutions state that improving the customer experience is the top corporate priority, the same organizations are increasing investment in privacy and security solutions more than any other technology. The reason for this investment is clear. Not only are the risks of breaches increasing, but also consumers are becoming much less tolerant of organizational mistakes. There has been a significant rise in the number of ‘phishing’ emails being sent to customers – emails that look like they are from the bank and that may be about financial support available in the wake of the pandemic, but which are actually a lure asking customers to provide or validate their account or identity information. Banks are proactively working to raise awareness amongst customers and providing guidance on the basics of good security. Cybersecurity and data privacy will become a unique selling proposition (USP) for many financial institutions and big tech Organizations. In this scenario, consumers will manage access to their data residing on applications, web and other digital channels, with the burden of complying with increasingly stringent regulations being the responsibility of banks. In this edition of a&sINDIA we attempt to highlight the recent developments and security solutions for the BFSI Sector. Focusing on the tech revolution in the industry, importance of cloud storage, multisite monitoring, and digital banking and payment apps. Along with the security risks faced while moving into this Era. We express our heartfelt gratitude towards patrons, peers and professionals in the security and fire industry, for their continued support. Your suggestions and feedback are valuable. Please feel free to reach out to us with your views on the edition.

6

Manish Gandhi [email protected]

Thank you! MARCH 2023

[email protected]

Shreya Raj Editor

Digital transformation in banking will no longer be only on the agenda for early adopters, but those banks that have previously fallen behind will be required to move away from legacy systems and implement strategies and services that support the needs and expectations of customers.

Hope you enjoy reading!

Publisher & Chief Editor

www.asindia.in

Advertising Circulation & Subscription Allwyn Fernandes Aparna Kadam Business Unit Manish Gandhi

Director Sales

Mumbai Delhi Bengaluru

+91-22-4286 3760 +91-11-6629 5700 +91-80-4852 4410

[email protected]

[email protected]

Messe Frankfurt New Era Business Media, Publisher of a&s India (a subsidiary of ABECL) 530, Laxmi Plaza, Laxmi Industrial Estate, New Link Road, Andheri (W), Mumbai - 4000 53, India.

Oil Asia Publication Private Limited,

Oil Asia Publication Private Limited (OAPPL), founded in 1983 by Surendra Mohan Singh Gandhi, is a more than 25-year-old publication, engaged in publishing industry specific magazine, organising exhibitions and conferences related to the oil, gas and petrochemical industry. The portfolio of a&s Magazine, published by Messe Frankfurt New Era Business Media (formerly known as a&s Group), includes a&s International, a&s International China Best Buys, a&s Asia (above published in English), a&s China, a&s Installer, a&s Solution, a&s Taiwan, Fire & Safety and Info Security (above published in Chinese). a&s Turkiye, a&s Adria, a&s Italy, a&s India, a&s Japan and a&s Vietnam are licensed editions. For change of Address or subscription problem, contact us at [email protected] Copyright@2011 Oil Asia Publication Private . All Rights reserved. No parts of this magazine may be republished, reprinted, redistributed, or reproduced in any way, including electronic, without prior written consent from the publisher. Advertisers are responsible for their own advertisement content. The publisher is not liable for any legal, patent, image or trademark disputes from advertisements or among advertisers.

Insight: • Best security boosts customers’ confidence in BFSI Best Security Boosts Customers’ Confidence in

• Well-protected payment gateways are of paramount importance

BFSI

• Multi-Site Video Monitoring is a Must to Avert Loss • Electronic safes & digital locks ensure utmost security

STAY UPDATED

Multi-Site Video Monitoring is a Must to Avert Loss Well-protected payment gateways are of paramount importance Electronic safes & digital locks ensure utmost security

Technological Improvements The case studies and interviews published every month in your magazine are extremely informative. The way solutions are provided for different sectors for various problems by multiple security firms give me a better idea of how to get things implemented. It is easy to get all the information online but the challenges faced and how to implement them has always been a daunting task. It is great that a security magazine promotes well-rounded information for the topics covered. It is good to be practically aware of thing via responses from industry experts of what is actually being implemented. --- Sudhanshu Singh, New Delhi Smart Retail The entire world is rapidly becoming digitalized. Retail stores find it tough to compete with e-commerce. Retailers operate in a very dynamic and competitive customer-driven industry that necessitates ongoing adaptation to match changing consumer expectations in order to keep customers returning. From department stores in the Industrial Age to today’s multi-channel, ubiquitous surroundings, the retail industry continues to evolve dramatically. However, despite how much the industry changes, retailers who remember that the ‘customer is king’ seem to persist. With artificial intelligence and virtual reality to provide for customers in a 360 degree manner. Getting views from industry experts on how things are expected to develop in the coming future was extremely interesting. Bridging the gap between the physical

8

MARCH 2023

GO MOBILE

and digital worlds, retailers must rise to the challenge of harnessing technological advances in ways that enhance the customer experience.

the technologies, policies, controls, and services that protect cloud data, applications, and infrastructure from threats.

With the developments in this field, an in-depth article about smart retail was enjoyable.

Digital risk management refers to digital processes for improving the evaluation and monitoring of riskwhich may include cybersecurity risk, third-party risk, operational risk, and numerous other types of risk. These risks can affect the organization’s financial performance, operation, or reputation.

--- Jay Shah, Bangalore Warehouse Management Your warehouse is an important part of your customers’ buying experience. Making sure products ordered are in stock and customers get what they purchased is crucial to providing good customer service. WMS improves picking accuracy so orders are correct the first time. Warehouse management can help companies maximize profitability and alleviate error. However, the potential obstacles to getting started with a new management system can be daunting.

It is good that your magazine focuses on such crucial topics. As there has been a lot of neglect of safety precautions overall in India. Companies are growing digitally but not taking enough cyber security precautions.

--- Arjun Rajeev, Kerala

The article published in the last edition was extremely knowledgeable. It gave me important tips to keep in mind while getting a warehouse management system. --- Karan Kapoor, Delhi Facial System Anti -Th

Recogn

ition

Integra

Facilita

tes Fas

tion Ess

eft Dev

ential

ices Imp

erative

Cloud Security The infrastructure in India isn’t that advanced to adapt to cloud storage easily. However, it is one of the essentials, which we need to adapt to. Hence, we should have a proper understanding of the same. It’s great that such services have started developing in India. It is a great step towards digitalization. Hence, is it essential to have a proper understanding about cloud security? Cloud security refers to

www.asindia.in

Facial Recognition Facilitates Fast Entry to Bonafide Customers

t Entry

for Har

to Bon

afide

monio

to Pre

vent

STAY UPDATED

us Ope

Custom

rations

Lossse

s

ers

for Eve

ry Org

STAY

anizat

ion

UPD ATED

System Integration Essential for Harmonious Operations for Every Organization Anti -Theft Devices Imperative to Prevent Lossses

GO MOBILE

GO MO

BILE

For security and fire safety news update log on to: www.asindia.in

www.facebook.com/asindiamag

https://www.linkedin.com/company/asindia

India

Hi-Tech Access Control Solution Armatura One Security Web-Based Versatile Security Platform

Personnel

Access

Attendance

Elevator

Visitor

Parking

Video

Office

Fire Alarm

Entrance Control

FaceKiosk

Temperature Detection

Defence

Data Monitor

Building Automation

Intrusion

AHDU Series

AHSC Series

AHDU-1160

AHSC-1000

AHEB Series

IP-Based Biometric Door Unit Controller

IP-Based Core Controller

AHDU-1260

IO Expansion Boards

AHDU-1460

AHEB-0216

AHEB-0808

AHEB-1602

● Main controller and integration hubs

● Door Type 1/2/4 Doors

● 2 Inputs and 16 Outputs ( AHEB-0216)

● PoE (IEEE802.3at)

● PoE (IEEE802.3at)

● 8 Inputs and 8 Outputs (AHEB-0808)

● Scalable, Supports up to 32pcs AHDU-1460 and 258 readers ● Onboard Webserver

● Scalable, Supports up to 24pcs AHEB expansion boards

● 16 Inputs and 2 Outputs (AHEB-1602)

● 4-States Supervised and Programmable Inputs (Active, In-Active, Open, Short)

● 4-States Supervised and Programmable Inputs (Active, In-Active, Open, Short)

● Threat Levels and Port Failover

Access Control Readers All Weather Outdoor Multi-tech Smart Reader

EP10 Series

EP10C

EP20 Series

EP20C

Card

e-Catalogue

● K10 & IP68 Protection Level ● Supports 100+ card types and dual RFID frequencies ● Supports Mobile Credentials (Bluetooth & NFC)

EP20CK

Card

EP20CQ

QR Code

EP20CKQ

Passcode

● Mullion Mount Design ● Supports Asian / European /Single-gang box back-box spacing

ZKTeco India Factory

B-1, Khata no. 31, Devasandra Industrial Estate, BBMP K R Puram, Whitefield Main Road, Mahadevapura, Bengaluru - 560048.

Contact : 080 6828 1342/48

: +91 99801 54338 Email ID : [email protected] Sales

Website : www.zkteco.in Technical

iVIS integrates a series of AI and IOT technologies with intensive monitoring of realtime video streams by trained security personnel and stops theft before it happens!

ry

R

s

s

Je ail & welle et

lar Farms So

s

ries & Pla cto nt Fa

struction Sit on e C

rveilla nc e

Su ty Ci

nks & ATM Ba

ds

ational Stand ar ern nt

I

uristic R & D Fut

n

nology + Intuit ch io Te

atical Serv Fan ice

Contact iVIS WIRELESS TRANSMISSION SERVICES Live Video Monitoring Technology Event Based Monitoring System

System wirelessly telecasts video & audio to One of our CMS (Central monitoring stations) 4G SIM Aggregation

REMOTE INTERVENTIONS

[email protected] www.ivis.net

Remotely start sirens, strobes & messages via public address system on perception of threat Two Way Communication

Virtual Guard Tours

SOLAR POWERED

REDUNDANCIES

Use of solar panels and “aggregated” cellular connectivity for seamless transmission.

Accenture Acquires Morphus, Brazil-Based Cybersecurity Company

Morphus’s deep cybersecurity research expertise, cyber-defense and threat intelligence services widen Accenture’s cybersecurity footprint in Latin America Accenture has acquired Morphus, a privately held Brazil-based cyberdefense, risk management and cyberthreat intelligence services provider, expanding its practice capabilities in Brazil and Latin America. Financial terms were not disclosed. Founded in 2003, Morphus is headquartered in Fortaleza, which is

Battery Backup Wireless & Wired Network Cloud and Local storage Dual monitoring centers

in the Ceará region in northeastern Brazil, with offices in Recife, São Paulo, Rio de Janeiro and Santiago, Chile. Morphus’s end-to-end portfolio includes red and blue team services; governance, risk and compliance services; enterprise risk management; cyber-strategy; threat intelligence; and managed security services (MSS). According to Accenture’s recent Cyber Threat Intelligence research, Brazil is one of the top victims of infostealer malware – a malicious software designed to steal victim information such as passwords. “Together with the capabilities and experienced leadership of Morphus, we will work as one team to help organizations build a cyber-resilient business and better secure their digital core, their technology and supply chains,” said Paolo Dal Cin, who leads Accenture Security globally. “The acquisition brings more than 230 highly skilled professionals,

making Accenture one of the largest cybersecurity professional services providers in Brazil. Our clients are always looking for the best solutions to strengthen their cyber-defenses, and the addition of Morphus expands our global research workforce and network of talented, innovative security professionals.” The acquisition expands Accenture’s portfolio and marks the launch of a Cyber-Industry practice in Latin America led by seasoned former CISOs from Morphus. The new offerings also expand Accenture’s position in Growth Markets in Morphus’s primary industry groups: communications media and technology, financial services, energy, retail and aviation. With a strong footprint in Brazil and Chile, the acquisition brings to Accenture Morphus Labs, a research facility in Fortaleza dedicated to cybersecurity studies, vulnerability and threat analysis and MSS. This will add a new Cyber Fusion Center in Fortaleza to Accenture’s existing global network, which includes Morphus’s cybersecurity R&D capabilities.

9

Reference from multiple sources

Indoor Monitoring System General Monitoring

Microsoft brings Bing AI features to Edge sidebar

To give you a quick recap, the ‘Chat’ feature lets you ask questions or quickly summarize the contents of a webpage or a document while ‘Compose’ is basically a writing assistant like ChatGPT that can help you generate text, social media posts

Punching In: Amazon Adding Counsel for Warehouse Safety Lawsuit Thanks to OSHA, Amazon.com Inc. has been on a hiring spree—of attorneys. While Amazon has announced it’s laying off 18,000 workers and has slowed plans to build offices for up to 25,000 employees in Arlington, Va., it has beefed up its legal defense team fighting federal safety investigations and complying with subpoena requests. “Amazon is undertaking that review process at great expense and burden— including more than 100 lawyers and millions of dollars—to comply with OSHA’s demands,” attorneys representing Amazon from Davis Wright Tremaine LLP and Gibson, Dunn & Crutcher LLP told a federal judge as part of the government’s investigation into potential safety issues at Amazon’s warehouses.

10

MARCH 2023

and emails and even lets users set the tone and the length of the text. The currently available list of tones includes professional, enthusiastic, casual, informational and funny. Apart from enabling AI-powered co-pilot features on the latest version of Edge, Microsoft also enhanced

the sidebar experience with the new auto-hide functionality, which works similar to the Windows taskbar autohide option, appearing only when users need it. Users will also be able to hover over the Bing icon on the top right of the screen to make the sidebar visible.

The company is expected to update the US District Court for the Western District of Washington April 14 about its progress meeting the government’s document and deposition demands. Amazon’s attorneys said they need to review 230,000 documents before turning them over to investigators. The company must also comply with more than 25 subpoenas for sworn testimony from Amazon officials. The review team includes attorneys from two other law firms with large occupational safety practices: about 25 from Jackson Lewis LLP and 30 from Ogletree, Deakins, Nash, Smoak & Stewart PC. “I have never been involved with any prior OSHA investigations that are as broad in scope, subject matter, and volume requests as this investigation,” Ogletree Deakins shareholder Melissa Bailey said in a court declaration. Jackson Lewis principal Melanie Paul, in another declaration, said she’s “not aware of any investigation in which OSHA has issued this many document requests.”

www.asindia.in

Representative Image

In addition, it looks like the new features are now available on the latest version of Microsoft Edge, which happens to be version 111.0.1661.41. According to the Edge release notes, the above-mentioned features will be accessible from the Bing icon on the top right of the screen.

Representative Image

Microsoft unveiled the new AIpowered Bing search with ChatGPTlike features. The company also announced that it will be updating Edge with AI features like Chat and Compose integrated in the browser sidebar.

The legal review could continue into the summer. US Magistrate Judge Michelle Peterson set several compliance deadlines, with Amazon ordered to fulfill OSHA’s request by June 30 and the US attorney’s request by July 31. The massive record review began after OSHA announced in July it had begun inspections at several Amazon distribution centers based on worker complaints and information from the US Attorney’s Office for the Southern District of New York. Since then, OSHA has cited seven Amazon distribution centers for not adequately protecting workers from ergonomic hazards such as muscle strains and back problems.

Representative Image

NEW DELHI: Amid raids and investigations being carried out by the National Investigation Agency, on activities linked to terror modules and radicalisation and the Ministry of home affairs have directed police heads of state and union territories to draw up a list of fugitives and operative who names have surfaced in investigations to keep a strict vigil on the social media platforms which are being used by these criminals backed by Pakistan to mobilise and influence impressionable Indian youths to indulge in anti-India activities. According to sources in the ministry, earlier it was believed that these activities were only restricted to the region of J&K but raids and crackdown have revealed that radicalisation is a rampant activity spread across in polets or more than 20 Indian states with social media platforms including whatsapp telegrams being used by handles and local operatives using Pak-prepared literature and content. The fact that Pak handles playing an active role in radicalising Indian youth – and motivating them to join militant groups supported like LeT and JeM - came

NSE imposes additional surveillance mechanism framework for these Adani stocks According to an NSE circular, Adani Enterprises, Adani Power, and Adani Wilmar have been included under the shortterm additional surveillance mechanism framework from Thursday. This information was released following the National Stock Exchange’s (NSE) and Bombay Stock Exchange’s (BSE) Monday announcement that Adani Enterprises will exit the framework for shortterm additional surveillance measures (ASM). According to the circular published by the exchanges, the adjustment will take effect on March 8. Three Adani Group firms, including the flagship Adani Enterprises, were placed under the framework of short-term additional surveillance measures by the NSE and BSE last month. The other two businesses listed by the exchanges, in addition to Adani Enterprises, were Adani Ports and Special Economic Zone (APSEZ) and Ambuja Cements. Nevertheless, on February 13 APSEZ and Ambuja Cements were excluded from the ASM framework. According to a Wednesday report by Bloomberg News, the beleaguered Indian behemoth Adani Group has repaid a $500 million bridging loan that was due on

to the fore in one of the recent chargesheets filed by NIA in Patna. The NIA alleged that the accused Danish was the admin of WhatsApp group ‘Ghazwa E Hind’ created by a Pakistani national namely Zain, and had added many people from India as well as other countries, including Pakistan and Yemen, with an intention to radicalize them and to constitute them into sleeper cells for carrying out terrorist activities. Danish had created the said ‘Ghazwa E Hind’ group on different social media platforms viz WhatsApp, Telegram, and Bip Messenger. Also in a recent case presently under further investigation by NIA– that raises concerns - a Delhi based tout, who has been securing visa for Indian technicians and labourers seeking work permits to Islamic countries were misusing their aadhar cards to procure secure SIM cards, details of which were being passed on to Pak handles, to circulate caustic literature and videos aimed at radicalising India youth.

Thursday. As a result of Hindenburg Research’s report, the market value of the shares of the seven publicly traded firms owned by the Adani Group has been dropped by over $127 billion. After Florida-based and Australia-listed investment company GQG Partners Inc. acquired holdings worth $1.87 billion in four of the group’s firms, including flagship Adani Enterprises, Adani stocks are witnessing some recovery. The flagship Adani Enterprises closed at a month high on Wednesday, capping off a six-day positive trend for the shares of Adani Group entities. After the group’s announcement that it has repaid share-based funding of `7,374 crore (more than USD 900 million) and would pay back all such outstanding debts by the end of the month, several of the group’s stocks also reached their upper circuit levels. Shares of Adani Enterprises climbed 2.86 per cent to close at `2,039.65 on the BSE, extending their winning streak to six straight days.

11

Reference from multiple sources

Representative Image

Centre intensifies social media surveillance amid growing radicalisation content

B Best security boosts customers’ confidence in BFSI

12

MARCH 2023

anking, financial services and insurance (BFSI) is the industry’s umbrella term for companies that provide a range of such financial products or services. This includes universal banks that provide a range of financial services or companies that operate in one or more of these financial sectors. BFSI comprises commercial banks, insurance companies, non-banking financial companies, cooperatives, pension’s funds, mutual funds and other smaller financial entities. The Banking part of BFSI may include core banking, retail, private, corporate, investment and cards. Financial services may include stock-broking, payment gateways, and mutual funds. Insurance covers both life insurance and general insurance. This term is commonly used by information technology (IT), information technology-enabled services (ITES), business process outsourcing (BPO) companies and technical/professional services firms that manage data processing, application testing and software development activities in this domain.

www.asindia.in

Aditya Khemka

Managing Director, CP PLUS

Key security concerns of BFSI Sector According to Aditya Khemka, Managing Director, CP PLUS., as our world is moving towards digitization with ever-increasing dependability on technology, it is also witnessing an increase in targeted and sophisticated cyber-attacks. In addition, even though these cyber-attacks are threatening all businesses, the BFSI sector is particularly vulnerable to them. India is still ahead when it comes to adapting new technologies in comparison to some other countries where bank customers are still wary of mobile applications fearing cyber threats. Through the leakage of data from food giants to international clothing brands, the personal information of millions of customers is stolen by cybercriminals worldwide, making it critical for the BFSI industry in particular to enhance protection against cyber threats. Cybersecurity breaches continue to grow in both frequency and sophistication for all industries, and the financial sector is particularly vulnerable. Financial services firms fall victim to cybersecurity attacks far more frequently than businesses in other industries. Security breaches lead to lost revenue for banking institutions, interruptions in operations, and loss of both reputation and customers. “Financial establishments experience threats from a variety of sources led

primarily by mobile applications and web portals. Cybercriminals may steal or manipulate valuable user data and or ‘clone’ banking apps in order to use them for nefarious purposes. Banking customers are moving away from using cash and checks and relying more on electronic banking to complete transactions. In response to this shift, financial organizations continue to develop more web portals and mobile apps. Although these apps and portals are aimed at increasing convenience and enhancing the customer experience, they pose unique risks in terms of cybersecurity”, comments Mr. Khemka. In light of these conditions, the government of India has been focusing on public procurement projects where a preference is given to the Make-in-India initiative. Numerous government-made mobile apps and web portals are also coming up so that the public does not have to depend on foreign applications alone, especially Chinese apps and web portals, which entail a higher risk of hacking as many of the Chinese tech companies have been deemed as working for the Chinese government or are controlled by it.

Cybersecurity breaches continue to grow in both frequency and sophistication for all industries, and the financial sector is particularly vulnerable. Financial services firms fall victim to cybersecurity attacks far more frequently than businesses in other industries. Security breaches lead to lost revenue for banking institutions, interruptions in operations, and loss of both reputation and customers.

“There are three major attack vectors that banking institutions and financial organizations need to consider. The first is the personal security of individual members accessing their

13

accounts, the second is the security of the tools you build for them to access their accounts, and third is your own internal team as they access your back-end servers and internal network (as well as the data housed on your network). Where you have a higher degree of control is on the security measures you build into your web portals and applications. Using monitoring and blocking technologies that protect from things like client-side JavaScript injection will help ensure that users aren’t experiencing autoredirect attacks or having login data skimmed”, observes Mr. Khemka. According to Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd., the India’s banking sector is perpetually facing major security challenges related to physical security

14

MARCH 2023

risks and online frauds. Most of the cases that are currently being reported across India are related to physical and electronic security incidents. The India’s public and private sector banks are not well equipped to handle the threats in realtime scenario in a proactive manner. Despite RBI guidelines, the security awareness and compliance remain a big concern in the Indian Banking ecosystem. It is clear that new threats demand renewed attention to Bank and ATM physical security framework. The Indian Banks need an urgent systemic overhaul of their physical security infrastructure to secure their assets, customers and business. The main concern for BFSI security continues to be the fastest changing technologies, bandwidth issues and seamless integration of security solutions at branch level. The physical security challenges faced by the bank branches are as follows: The challenge gets bigger when the theft physically occurs in the branch and the incident video data, including storage device is stolen by the criminals. The Banks must train the banking staff on physical security

www.asindia.in

Ashish P. Dhakan

MD & CEO, Prama Hikvision India Pvt. Ltd.

systems and forensic investigations to overcome the risks and challenges. Some of the vital security apprehensions are as follows: Seamless Integration of security Systems: Bank branches are spread in multiple states with different environments, the seamless integration of security systems becomes a challenge due to cost, technology and bandwidth constraints. Interoperability: Different Brands and different Installation type by vendors make it very difficult to achieve interoperability of security systems. Bandwidth Constraints: Bandwidth Constraint doesn’t allow end-users to keep all security gadgets in synchronized manner and monitor all the devices on one integrated platform. Budget Constraints: Budget constraints sometime force end-user goes with economic items and some branches have very old systems, which prevents the user to have clear details /upgraded footage to use it for forensic analysis or business intelligence. Multi-Location Issue: Multi-Location issue makes it difficult to capture footages, videos onto the central monitoring systems. Uniform Maintenance Protocol for Surveillance System: No uniform

maintenance protocol for surveillance system is followed by the end-users. The surveillance systems are not stable and strong. There is no active deterrent to stop vandalism or theft of the systems. Updates on Hardware & Software: Low-resolution camera, old legacy systems, poor image quality, limited storage capacity, lack of clarity add to the difficulties in detailed investigations (related to incidents). ATM Security Awareness: The lack of ATM security awareness causes huge loss to bank and consumers. Breakdown of ATM machines, card reader installations, skimmers rob customers after withdrawal, customer dispute, unidentified person withdrawal, burglary of ATMS machines along with recorders, Risk Mitigation: The lack of risk mitigation mechanism and standard operating procedure makes banks more vulnerable. The Bank also has problems like low degree of intelligence, passive defense and low efficiency management. According to Sumanth BA, National Sales Manager-Enterprise Business., Cyber Security is an ongoing concern in every industry including BFSI as a vertical. Banks & other financial institutes are under increasing scrutiny to ensure that they appropriate security measures in place especially in the wake of

The main concern for BFSI security continues to be the fastest changing technologies, bandwidth issues and seamless integration of security solutions at branch level. The physical security challenges faced by the bank branches are as follows: The challenge gets bigger when the theft physically occurs in the branch and the incident video data, including storage device is stolen by the criminals. The Banks must train the banking staff on physical security systems and forensic investigations to overcome the risks and challenges.

15

numerous data breaches that have taken place over the last few years. Video Surveillance is no exception as this cctv cameras becomes people eye when it is deployed at any facility. Gone are those days where cameras were all analog and no connection to a network and now all cameras what we see is all on the network and all those devices which is associated to that network are at high risk of being hacked. Though there are multiple level of encryptions on the communication protocol and firmware to protect from accessing to banking networks there are possibilities in today’s scenario especially through surveillance cameras. We at Hanwha strongly bound to our tagline “we move with trust” which gives immense reliability to our BFSI clients in knowing how safe Hanwha

16

MARCH 2023

cameras which are being installed in various places like core banking, retail outlets, ATM’s and Cash Deposit Machines etc which are the places where there would be a lot of public movement. According to Parthesh Dhaggal, Founder, Enceplon., unencrypted data, ransomware, spoofing, insecure third party services, phishing, DDoS Attacks, threat from employees, supply chain attacks, hacking, money laundering, bogus NGO and terrorists financing, cloning debit/credit identity thefts, impersonations and online frauds. Also, the complex security infrastructure due to deployment of several point multivendor solutions and difficulty in meeting compliance requirements. Political influence and interference in loan sanctioning, loan melas and loan waivers for certain sections. According to Kaushal Kadakia, Marketing Manager, Matrix Comsec., one of the primary concerns of the BFSI sector is securing their banks and ATMs from miscreants. Annually an average of 1000 incidents pertaining to ATM robbery

www.asindia.in

Sumanth BA

National Sales Manager, Enterprise Business

occur which lead to a loss of crores to the banks. In spite of having avantgarde security deployments like video management software, financial institutions overlook the need to design a theft-proof comprehensive security solution for their banks. Sensitive areas like the cash counters, locker rooms, and server rooms demanding a high level of security are left unguarded due to a lack of adequate security coverage. Therefore, it is of prime importance for financial institutions to secure their premises. Additionally, banks have to restrict access to sensitive areas to ensure that the valuables and data are not tampered with. According to Jiten mahapatra, VP/ Marketing manager ZKTeco India., the increased adoption of digital payment system in the recent years, especially after the demonetization accentuate the need for enforcing the security platforms associated with BFSI sector. While cyber threats being a major concern to finance institutions peculiarly in countries where lack of cybersecurity awareness exits like India, the susceptibility to such kind of attacks remain as a stumbling block despite widespread implementation of countless security measures. Cybercrime attacks and data breaches via malicious malware is still a great concern to the BFSI sector as cyber criminals come up with new strategies to counteract the defensive framework and preventive measures adopted

by finance organizations, indicating that the security platforms used by these organizations are not secure enough and contain loopholes. Mobile based online transactions are also at a greater risk with mobile systems being more prone to variety of malware and malicious links designed to heist confidential information for illegal activities. Despite the employment of various security policies such as biometric authentication, smart card purchases, debit/credit PIN & OTP authentications, etc., to prevent hacking, cyber criminals still find a way to perform illegal activities and unauthorized transactions. By employing more robust security platforms with foolproof mechanism and by creating a proper awareness among consumers, these kinds of fraudulent activities can be circumvented. Drivers and restraints of the BFSI Security Solutions According to Aditya Khemka, the biggest driver in the BFSI sector for introducing better security solutions is the increasing implementation of regulatory standards, which more and more governments are seeking nowadays. That coupled with the rise in the adoption of cloud-based security solutions and rapidly improving modes of online payments is expected to be changing the industry in many revolutionary ways.

Well BFSI sector is one such critical infrastructure segments that suffer several data breaches & cyberattacks owing to the large customer base & data. Financial Service institutions are 4 times more susceptible to cyber-attacks than other industries due to all financial transactions. In today’s world, we have AI & IOT even on cameras, which would be of great help for the end users at the same time even the slightest data breach would result in massive disaster, which could happen.

17

“In recent years, we have seen that as the technology that serves critical sectors like retail, finance, IT, & Security evolves, the skills required to manage it, as well as the usage of automation, evolves. However, these innovations have also emerged as a dominant force to face the global threat environment of bugs, hacks, and malware. The increasing prevalence of digitization is also causing a huge shift to depend upon digitized information. This digitization becomes an issue when large amounts of data are to be shared in either external or internal environments, as well as around the globe and this is what makes companies fall victim to cybercrime through multiple modes of attack. The global cybersecurity market is segmented based on offering, deployment, component, industry vertical, organization size, and

18

MARCH 2023

region. Based on the component, the market is bifurcated into services and solutions. The services sector is likely to grow at a high CAGR in the coming time. Organizations are recruiting third-party suppliers for their protection templates, thus stimulating the development of security as a service (SaaS). In comparison, third-party suppliers on the market are giving the clients a reliable solution at a reduced cost thus boosting market growth”, notes Mr. Khemka. Based on offering, the market is categorized into infrastructure security, identity and access management (IAM), data security and privacy service offering, governance, risk & compliance, and unified vulnerability management service offering. The market for IAM held almost 25% share of the market in 2019 as the number of cyber-attacks has risen worldwide since then, and alleviation of the casualties resulting from these events has become a major concern in all industries. Rising cyber-attacks on small and medium-sized businesses are likely to fuel demand for IAM and enterprise security solutions.

www.asindia.in

Kaushal Kadakia

Marketing Manager, Matrix Comsec

According to Ashish P. Dhakan, the key drivers of the BFSI security solutions market, includes increased security awareness, enhanced threat perception, rise in bank and ATM robberies, and a growing number of financial crimes. The key restraints of the BFSI security solutions market remains a lack of policy framework and standards, low level of awareness, budgetary constraints and legacy technologies and platforms, interoperability and integration of various security systems, cybersecurity and data security concerns. In the wake of the rising number of thefts related to Currency Chest and Locker Room, Reserve Bank of India (RBI) has issued the revised instructions for the same. These instructions are mandatory. The revised instructions have come into force with effect from January 1, 2022 (except where otherwise specified) and be applicable to both new and existing safe deposit lockers and the safe custody of articles facility with the banks. According to RBI Instructions, the Infrastructure and Security Standards for Security of the Strong Room/ Vault are as follows: Banks shall take necessary steps to ensure that the area in which the locker facility is housed is properly secured to prevent criminal break-ins. The risks of accessibility of an allotted locker

from any side without involvement of the locker-hirer concerned may be assessed and kept on record. Banks shall have a single defined point of entry and exit to the locker room/ vault. The place where the lockers are housed must be secured enough to protect against hazardous impact of rain / flood water entering and damaging the lockers in contingent situations. The fire hazard risks of the area should also be assessed and minimized. The banks, as per their policy, shall conduct necessary engineering / safety verification regularly to identify the risks and carry out necessary rectification. The area housing the lockers should remain adequately guarded at all times. The banks shall install Access Control System, if required as per their risk assessment, which would restrict any unauthorized entry and create digital record of access to the locker room with time log. As per their internal security policy, banks may cover the entry and exit of the strong room and the common areas of operation under CCTV camera and preserve its recording for a period of not less than 180 days. In case any customer has complained to the bank that his/her locker is opened without his/her knowledge and authority, or any theft or security breach is noticed/observed, the bank shall preserve the CCTV recording till the police investigation is completed and the dispute is settled.

The Security system market for the BFSI sector can be deeply restrained by the inability of the solution to provide centralized command and control for the innumerable locations in which the bank operates. The distributed structure of the banks would also mean the unavailability of reliable data networks for remote locations. Additionally, the physical security solution should be able to integrate seamlessly with the existing security infrastructure of the bank. If the solution cannot accommodate existing brands of devices it would push the cost of the solution and deter the customer from embracing newer technology.

19

The security procedures shall be welldocumented and the staff concerned shall be properly trained in the procedure. The internal auditors shall verify and report the compliance to ensure that the procedures are strictly adhered to. This move by RBI will have a significant impact on the Banking Security Management. According to Sumanth BA, well BFSI sector is one such critical infrastructure segments that suffer several data breaches & cyber-attacks owing to the large customer base & data. Financial Service institutions are 4 times more susceptible to cyber-attacks than other industries due to all financial transactions. In today’s world, we have AI & IOT even on cameras, which would be of great help for the end users at the same time even the slightest data breach would result in massive disaster, which could happen.

20

MARCH 2023

According to Parthesh Dhaggal, the drivers include increase in physical and virtual threats such as burglaries, cyber-attacks, data thefts, global terrorism, cybercrimes espionage, and the adoption of advanced technologies. The unprecedented rise in data breaches and other security risks, government initiatives and strict compliance of regulatory rules drive the demand for security solutions in this sector. Further, rising demand for cloud-based security solutions, nationwide computerization, and transformation to digital banking, advanced data analytics, securing humancyber touchpoints, safe, secure payment gateways, penetration of internet across the country are propelling the installations of security solutions for BFSI sector. The global security solutions market size was USD 249.65 billion in 2018 and is projected to reach USD 483.62 billion by 2026, exhibiting a CAGR of 8.84% during the forecast period. The restraints are high initial investment required to set up security infrastructure, legacy technology, inadequate infrastructure, insufficient skilled

www.asindia.in

Jiten Mahapatra

VP/Marketing Manager, ZKTeco India

manpower, connectivity problems, lack of cyber security, incompatibility among disparate security devices and budget constraints delaying adoption of latest technologies. According to Kaushal Kadakia, the driver of the BFSI physical security market is the rising demand for cloudbased security solutions. Banking and other financial institutions need security solutions that are easy to install. Also, the data fetched should be easily accessible from a central location. Cloud-based video surveillance systems to cloud-based access control systems are being installed to deal with potential threats proactively. The security solutions for the BFSI market get further impetus from converging their existing security solutions. For instance, video surveillance integration with the current access control system can boost the security of the organization. The Security system market for the BFSI sector can be deeply restrained by the inability of the solution to provide centralized command and control for the innumerable locations in which the bank operates. The distributed structure of the banks would also mean the unavailability of reliable data networks for remote locations. Additionally, the physical security solution should be able to integrate seamlessly with the existing security infrastructure of the bank. If the solution cannot accommodate

existing brands of devices it would push the cost of the solution and deter the customer from embracing newer technology. Furthermore, the reliability of the solution is a major concern for the BFSI sector. So, if the platform cannot provide central control to the banks or other financial institutions it can act as a restraint. Moreover, if the platform is exclusive to the parent company’s devices and it is not device and platform agnostic it might act as a restraint for the buyer. Another factor that can act as a backstep is the system malfunction which makes the customer doubt the reliability of the system. Other features include the risk assessment carried out by the customer which might influence their judgment. According to Jiten mahapatra, cyber security breach has become a common term now a days in finance sector among other organizations alarming both consumers and leaders emphasizing the importance of employing powerful security measures. Although many factors are contributing to the growth of BFSI security market in India, wide-spread adoption of digital payment system and cyber-security concerns associated with it, are the most significant drivers fuelling the BFSI security market. While it is almost impossible to penetrate physical security systems employed

Cyber security breach has become a common term now days in finance sector among other organizations alarming both consumers and leaders emphasizing the importance of employing powerful security measures. Although many factors are contributing to the growth of BFSI security market in India, wide-spread adoption of digital payment system and cyber-security concerns associated with it, are the most significant drivers fuelling the BFSI security market.

21

Cyber threat intelligence

in finance institutions, cyber-odds pose the greatest threat to the BFSI sector. On the other hand, inadequate cognizance among people and lack of manpower in cybersecurity industry are some of the major factors hindering the market from utilizing its full potential. Which may result in an escalated market growth for cyber security products than that for services. When it comes to the technology side, demand for innovative and robust security solutions, increasing investments in R&D, advanced technologies such as Artificial Intelligence, Biometric technology, Internet of Things (IoT), Integrated Security Solutions, Cloud Technology will fuel the BFSI security market.

22

MARCH 2023

According to Aditya Khemka, “Machine learning, AI and big data have been the focal points of data intelligence and datadriven culture for years now, influencing many new technologies and developments. Data can do a lot for us, but raw data is only the product of observation and entails nothing more than that, it is an analysis that brings forth the predictive powers of the data. That’s the reason why the world has been turning to data intelligence. As we are living in the age of data, the explosive data growth that we are experiencing is most likely to keep booming. Data intelligence or cyber-threat intelligence was introduced because especially in cybersecurity, the power to predict future attacks even if they reach targeted networks can help organizations in prioritizing their responses, speeding up the decision-making process as well as response time, and in providing better security altogether.”

www.asindia.in

Parthesh Dhaggal Founder, Enceplon

Threat intelligence is a widely-used term now. If you are a cybersecurity professional, you must be familiar with the term even if you don’t fully understand the nuances. Threat intelligence plays a crucial role in today’s cybersecurity defence apparatus and must be correctly understood by professionals working in the various domains of cybersecurity, especially those in security operations centres, dealing with SIEM-like tools or those that work with incident response teams. Cyber threat intelligence is what cyber threat information becomes once it has been collected, evaluated in the context of its source and reliability, and analyzed through rigorous and structured tradecraft techniques by those with substantive expertise and access to all-source information. Like all intelligence, cyber threat intelligence provides a value-add to cyber threat information, which reduces uncertainty for the consumer, while aiding the consumer in identifying threats and opportunities. It requires that analysts identify similarities and differences in vast quantities of information and detect deceptions to produce accurate, timely, and relevant intelligence. “Threat intelligence, specifically, is collecting and analyzing information about the indicators of past, current and future cyber threats, which enables an organization to take actions

to protect their assets, network and the entire organization. It is imperative to note that the keyword here is ‘analysis’. Many security advisors while describing cyber attacks, mention the term ‘variant’. An attack is a variant of some other attack that has occurred before. It will not be wrong to conclude that most of the attacks are only derived from other attacks and that it is not difficult to create attacks or rather exploits. Hence, even when compromised systems are analyzed by threat hunters, they find common suspicious connections or IP addresses that have the capability to bypass existing security solutions”, comments Mr. Khemka. The presence of such artefacts in compromised systems is nothing but indicators of compromise (IOC). Analysis of IOC’s enable security researchers to understand the attack and defend their system or network from similar attacks in the future. Threat intelligence is based on the same idea. The goal is to collect indicators of compromise on national and international levels from different sources, correlate them, and send it to systems like SIEM in the next-generation firewalls (NGFW) that provide realtime analysis of security alerts so that it is monitored and examined by security analysis to take correct

Unencrypted data, ransomware, spoofing, insecure third party services, phishing, DDoS Attacks, threat from employees, supply chain attacks, hacking, money laundering, bogus NGO and terrorists financing, cloning debit/ credit identity thefts, impersonations and online frauds. Also, the complex security infrastructure due to deployment of several point multi-vendor solutions and difficulty in meeting compliance requirements. Political influence and interference in loan sanctioning, loan melas and loan waivers for certain sections.

23

remediation steps. This importance of threat intelligence has also led to monetary investment by organizations in threat data. Rather than being developed in an end-to-end process, the development of intelligence is a circular process, referred to as the intelligence cycle. In this cycle requirements are stated; data collection is planned, implemented, and evaluated; the results are analyzed to produce intelligence, and the resulting intelligence is disseminated and re-evaluated in the context of new information and consumer feedback. The analysis portion of the cycle is what differentiates intelligence from information gathering and dissemination. Intelligence analysis relies on a rigorous way of thinking that uses structured analytical techniques to ensure biases, mindsets, and uncertainties are identified and

24

MARCH 2023

managed. Instead of just reaching conclusions about difficult questions, intelligence analysts think about how they reach the conclusions. This extra step ensures that, to the extent feasible, the analysts’ mindsets and biases are accounted for and minimized or incorporated as necessary. Mr. Khemka states, “The process is a cycle because it identifies intelligence gaps, unanswered questions, which prompt new collection requirements, thus restarting the intelligence cycle. Intelligence analysts identify intelligence gaps during the analysis phase. Intelligence analysts and consumers determine intelligence gaps during the dissemination and re-evaluation phase. One of the biggest takeaways of cyber threat intelligence is the change of security approach from reactive to proactive. It brings proactive defence against any threats that emerge outside your landscape before they even hit you. But it can only do that if it’s relevant, punctual and actionable. So, data presented in cyber threat intelligence needs to be contextualized, evidence-based, and relevant.”

www.asindia.in

are becoming increasingly complex and sinister by the day. However, we are not completely defenceless, there are various security practices available today to enforce and assess the firmness of a cybersecurity platform such as Endpoint Detection and Response (EDR), Ethical Hacking, Cyber Attack Drills, Embedded System Security Assessment, Cyber Intelligence, Code Audit, Security Trainings, etc.

According to Ashish P. Dhakan, the Cyber Threat intelligence benefits organizations of all shapes and sizes by helping process threat data to better understand their attackers, respond faster to incidents, and proactively get ahead of a threat actor’s next move. For SMBs, this data helps them achieve a level of protection that would otherwise be out of reach. According to Sumanth BA, a good factor to trust any BFSI organization will happen in knowing how safe they are to their clients in managing such huge data of every individual. These factors would measure at various situations and one of them is majorly in surveillance cameras. There are many instances where cctv cameras were hacked to get many personal information and were able to access many confidential information and have resulted in huge loss to both client and banking organization. Cyber Threat Intelligence will always play a vital role in defending such cyber-attacks and threats even in surveillance solutions. Big giants in BFSI will have a cyber-threat intelligence held responsible in doing a scrutiny on the cameras, which an organization plan to deploy in all their facility. This team does a vulnerability penetration test based on various parameters and many are mentioned in OWASP top risk analysis. Only if a camera proves that it is not vulnerable

to such test they decide to proceed with that make and model of the camera. We at Hanwha are proud to say that we make reliable products with our state of art Wisenet 7 SoC that maintains highest standards for cyber security risk assesements. According to Parthesh Dhaggal, cyber-Threat Intelligence (CTI) collects information about present and potential future cyberattacks and threat actors, which firms can use to improve their cybersecurity and eliminate the probability and damage of future cyberattacks. CTI is beneficial in many ways: CTI is 1.Cost effective, 2. Improves the efficiency of security team and system and the bottom-line, 3. Prevents data breach, 4.Lowers risks, 5. Promotes collaborative knowledge, 6. Paves way for in-depth analysis which helps in establishing robust security protocols to prevent cyber-attacks, 7. Protects from new vulnerabilities,8. Accelerates recovery process, 9. Equips an organization to make informed decisions, 10. Helps get ahead of hackers and cyber-criminals to frustrate their intent and keep the system safe and secure. According to Jiten mahapatra, as the world goes digital, BFSI organizations need to administrate sophisticated real-time security approaches and robust security policies to shield against cyber-attacks. These attacks

There are certain high-end technologies that will the mark the era of next generation cybersecurity. Given the scale of threat protection that need to be employed, Artificial Intelligence (AI) based solutions along with biometric technology will drive the future of cybersecurity. Deep Learning & Behavioural Analytics is being explored to identify patterns of network activities to detect realtime cyber-attacks. Powerful useridentification techniques such as Embedded Hardware Authentication will fortify hardware accessibility. Blockchain Cybersecurity is one of the highly advanced technologies these days offering a virtually impenetrable network and defend against data breach. Blockchain technology coupled with Artificial Intelligence and Biometric technology can offer an unbreakable security system to keep potential cyber-threats at bay. However, no technology can be regarded as 100 % fool proof, as the technology progress so does the tools and mechanisms for hackers to invade the security systems. To combat this, finance organizations need to constantly monitor their security platforms and employ advanced security solutions. Rising trends of security solutions for banking industry. According to Aditya Khemka, the adoption of cybersecurity solutions is expected to grow with increasing investments from countries such as India, Italy, Spain, Canada, Oman, South Korea, Qatar, and others. In addition, the rising demand for enterprise security solutions from banks and other financial institutes is anticipated to boost the market size in the forthcoming years.

25

In the present scenario, security related to the BFSI sector has become the primary concern for the corporate, public, and private divisions. The growing adoption of e-commerce and the advancement of disruptive technologies such as AI and blockchain has increased the addition of cybersecurity solutions in a connected network ecosystem. As per the current market, these factors will also enormously boost the cybersecurity market growth in the coming years.” According to Ashish P. Dhakan, the BFSI space is now adopting contactless security technologies faster than ever. The secure contactless payment is going to be the fastest growing trend in the future due to the challenges posed by the pandemic. Mobile wallets will be soon more prevalent than physical wallets. The threat of financial losses has

26

MARCH 2023

made companies innovate in the field of cybersecurity. To not suffer from reputational damage and face the regulatory consequences, BFSI companies are innovating to detect loan frauds and cyber-crimes. With the growing IP trend, Hikvision’s latest Smart Banking Security Solutions are best-in-class in the market. These include, Advanced Artificial Intelligence based Applications Cameras and Access Control Terminals with Facial Recognition, Acusense and ColorVu Cameras with Smart Applications and All-In-one Intrusion Alarm Solutions. These advanced surveillance and security systems offer following outcomes, which includes, High Definition Surveillance, Intelligent Applications, Centralized Management, and Maintenance Management. VIP Customer Service With a busy bank having large numbers of people through the doors every day, it could be useful to be able to help with customer service. But it can also be used to help with customer service. When clients opt to participate in VIP customer service programs, facial recognition technology can give banks

www.asindia.in

accurate tools to identify VIPs so staff can provide the right kind of service at the right time. When the security around the vault needs to be strengthened, there are facial recognition options too, which can be supported by a Hikvision DeepinView camera. If the camera is connected to an access control system, it could literally be that only registered people could enter. Deep Learning Technology Solution for ATMs In an ATM machine, two covert cameras are installed, one trained on the user, the other on the ATM panel. Deep Learning technology embedded in the ATM security system can detect any ‘abnormalities’ in the facial scene in front of it, referring to existing data patterns. So, if there is another face in the picture (for example, someone looking over a user’s shoulder), or if the person wearing a mask, an alarm can be triggered in the security center. Using the same technology, the security system can also flag if the number pad is covered with a strip to steal PIN codes, or if a false card reader (or ‘skimmer’) is present to steal card details. The Deep Learning ‘engine’ here would be the Hikvision DeepinMind NVR, which takes the information from the camera and analyses it while using Deep Learning algorithms. This can also ‘manage’ footage, in conjunction with other NVRs and a video management system, which brings this part of a total solution together with all the other elements, providing a powerful toolset for security and business intelligence. According to Sumanth BA, of course the rising trends of cctv in banking industry is nothing but AI, deep learning and IOT solutions. Through these technologies, we are able to detect and notify various detected threats and deterred with highest accuracy, which is able to fulfil the business intelligence. Hanwha cameras have capacity to identify only humans, their gender, tentative age, type of body clothing, colour of their clothing, person wearing mask, goggles, social distancing, people counting on realtime basis based

on gender, vehicle category and classification, audio classification which can determine gunshot, person screaming, an explosion or breakage of glass and many more which can act on the real case scenario and stop before a crime happens. All these analytics, which is mentioned, are all on edge on the camera and no dependency on any third party software. With all these analytics a one can not only use Hanwha cameras for forensic search which is for post mortem instead it will alert people and can integrate with other devices so that one can stop intrusion, theft, fraud, unauthorized access, acts of violence, terrorism etc. Lastly, with the best of best encryptions and cyber-security enabled product Hanwha is having one of the industry standard reliable and proven products that is catering to BFSI and many other segment across the globe through which we are proud to say that we are a global leader. According to Parthesh Dhaggal, the rising trends include Artificial Intelligence for fraud prevention, Predictive AI for business intelligence, Robotic Services, Consumer’s growing demand to pay for digital services and goods in the metaverse, multi-cloud storage, Advanced Encryption of Data, Digital Opening of Accounts and Video Collaboration Tools. Remote Monitoring Health Services (RHMS) to check all the systems are operating smoothly 24x7 are also catching fast. Furthermore, Adoption of block chain technology to lower the risks of data breach and Increased Demand for Third-Party Risk Management, More Organizations Will Outsource Cybersecurity, Cyber Insurance Will Drive Demand for Risk Assessments and API Deployment in B2B Banking Segement. Self -service and Contactless Banking and opportunities from 5G network are multi-cloud among the top bank technology trends for banking industry. According to Kaushal Kadakia, the banking sector relies heavily on robust security solutions as security

breaches could lead to huge losses and dent the reputation of the bank. The reliability of the bank is a critical driver for their business. Efficient security solutions are proactive in dealing with theft, loitering, and intrusion. Intelligent video analytics have attractive capabilities like missing object detection, motion detection, and intrusion detection to combat security threats. Again, if the miscreants try to tamper with security devices like cameras then in such cases notifications are sent immediately. As the BFSI sector is more concerned with indoor security due to sensitive areas such as locker rooms, cash counters, and data centers handling huge customer databases, they opt for Dome IP cameras or Turret IP Cameras in order to secure their premises. Again, Bullet IP cameras act as a line of defense in the external peripheral environment of the banks or financial institutions. As in the case of access control solutions, contactless access control solutions are being deployed postCOVID-19. With physical contact as a red sign for banks, the shift has been seen toward implementing contactless access control solutions. Solutions like Bluetooth-based access control and QR-based access control, access control based on palm vein authentication, and face recognition are being deployed. According to Jiten mahapatra, integrated Security Solutions coupled with cutting-edge technologies such as Artificial Intelligence (AI), Internet of Things (IoT), Biometric Technology, Cloud Security, etc., providing a holistic security environment transcend the conventional security solutions by offering real-time protection against cyber-attacks. Whereas the Physical Security Solutions such as Biometric Authentication Systems, Biolocks, Multi-Door Access Controllers, and Video Surveillance integrated with AI, Inspection Devices, Locker Solution, etc., can keep the intruders at bay.

27

Payment Apps Well-protected payment gateways are of paramount importance

A

mobile payment, also referred to as mobile money, mobile money transfer and mobile wallet, is any of various payment processing services operated under financial regulations and performed from or via a mobile device, as the cardinal class of digital wallet. Instead of paying with cash, cheque, or credit cards, a consumer can use a payment app on a mobile device to pay for a wide range of services and digital or hard goods. Although the concept of using noncoin-based currency systems has a long history, it is only in the 21st century that the technology to support such systems has become widely available. In developing countries, mobile payment solutions have been deployed as a means of extending financial services to the community known as the “unbanked” or “underbanked”, which is estimated to be as much as 50% of the world’s adult population, according

28

MARCH 2023

www.asindia.in

to Financial Access’ 2009 Report “Half the World is Unbanked”. These payment networks are often used for micropayments. The use of mobile payments in developing countries has attracted public and private funding by organizations such as the Bill & Melinda Gates Foundation, United States Agency for International Development and Mercy Corps. Mobile payments are becoming a key instrument for payment service providers (PSPs) and other market participants, in order to achieve new growth opportunities, according to the European Payments Council (EPC). The EPC states, “new technology solutions provide a direct improvement to the operations efficiency, ultimately resulting in cost savings and in an increase in business volume”. Benefits of using banking and payment apps. According to Parthesh Dhaggal, Founder, Enceplon., there are several benefits that the user gets by using banking and payment apps. They are access to your bank 24×7, review your account history, track your spending and transfer your funds. With internet banking, you can transfer money from one account to another, book deposits, pay bills & rechare, track account and check balances. You can place orders for bank products, Add-on Services. ASBA or Application Supported by Blocked Amount has the facility that an IPO’s applicant isn’t debited until the he or she receives allotment of shares. Other major benefits include utmost convenience,

time saving, easy to use and monitor, round-the-clock access, auto-debit facility: safety and security and international transfers and optimal efficiency. You can perform banking transactions on the go. You can also track your investments and returns, and make changes to your portfolio, if required. With internet banking or a digital banking app on your smartphone, you can invest in various instruments with just a few taps. For example, you can open a fixed deposit account, or invest in mutual funds, stocks, bonds, and several other instruments. You can also track your investments and returns, and make changes to your portfolio if required. A mobile banking app can be handy since it offers a host of benefits and features. You can avail of banking services anytime and from anywhere and have complete control of your finances. At the same time, it is important to take certain precautions like keeping your ID and password safe in order to safeguard and protect the mobile banking app from any unauthorized access or usage. Challenges associated with banking and payment apps According to Parthesh Dhaggal, as huge amount of money is involved the banking and payment apps are beset with many challenges. They include meeting security standards, protecting user data, adhering to regulatory compliance, selecting the right platform to build the app, choosing the right features, meeting customer expectations and keeping up with new trends. There are financial frauds, bank account hacking, theft of passwords or PINs. There is also risk of malware and virus attack which might lead to third party accessing an individual’s private data and details such as their usernames, passwords etc. Technical issues such as failed connectivity, lack of accurate data, UPI Downtime. Fake bank numbers/e-wallets/incorrect search engine results/ frauds through social media. Phishing: Spoofed emails/SMS, designed in such a way that customers think it is from the bank. Misusing UPI ‘collect request’, by sending fake messages to collect money. Remote access enables customers unknowingly download an application on their mobile/computer giving access to customer data. Steps to avoid fraudulent activities According to Parthesh Dhaggal By a) keeping anti-virus software up-to-date, b) regularly changing passwords, c) always activating Two-Factor Authentication (2FA), d) securing Online Data and Mobile Devices, e) never using public or shared Wi-Fi at coffee shops, airports, libraries, etc., f) never providing passwords, PIN numbers, account numbers, etc. over the phone or via text or email, g) using different emails and passwords for each financial account, h) wary of links and attachments in emails, sponsored content pop-ups, and texts ,i) upgrading to a VPN (virtual private network), j) always securing your home router with a strong password and WPA2 – or better, WPA – security, k ) building robust firewalls & spyware blockers, l ) employing biometrics (fingerprint sign-on

A mobile banking app can be handy since it offers a host of benefits and features. You can avail of banking services anytime and from anywhere and have complete control of your finances. Parthesh Dhaggal Founder, Enceplon

or facial recognition) we can avoid getting trapped into fraudulent activities Digital banking transformation trends for 2023. According to Parthesh Dhaggal, banks to deepen customer relationships via AI, chatbots etc. and virtual assistants are set to mushroom. Banks will focus on automation and a continued push to the cloud. Financial institutions will increase their use of low-code and no-code development tools and move further with AI and the cloud. In 2023, you can expect more blockchain-based transactions. Big Data & Analytics will become essential in customer acquisition efforts as well as market driven product. In 2023, automated processes are expected across the board to transform service. More and more consumers prioritise digital solutions when choosing their financial transactions. APIs will become an effective tool for banks to create new opportunities in cross selling. The resulting integration with latest technologies backed by 5G could result in faster innovation and better customer experience. In 2023, open APIs will likely still be the preferred choice for banks and Shift to Mobile-First Customer Focus and Increased Emphasis on ESG and DEI.

29

Multi-site

Video Monitoring

S

urveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing.This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception. Surveillance is used by citizens for protecting their neighborhoods. In addition, by governments for intelligence gathering - including espionage, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to gather intelligence on criminals, their competitors, suppliers or customers. Religious organisations charged with detecting heresy and heterodoxy may also carry out surveillance. Auditors carry out a form of surveillance.

30

MARCH 2023

www.asindia.in

Multi-Site Video Monitoring is a Must to Avert Loss

A byproduct of surveillance is that it can unjustifiably violate people’s privacy and is often criticized by civil liberties activists. Liberal democracies may have laws that seek to restrict governmental and private use of surveillance, whereas authoritarian governments seldom have any domestic restrictions. Espionage is by definition covert and typically illegal according to the rules of the observed party, whereas most types of surveillance are overt and are considered legitimate. International espionage seems to be common among all types of countries.

Challenges in multi-site video monitoring According to M.A. Johar, President of Government Business Vertical, CP PLUS., the rapidly prevailing video surveillance around the world is persistently benefitting its users through experiencing everything from greater on-site security to increased workplace productivity. But the more heavily businesses, schools, and other organizations rely on these critical technologies to protect themselves and the people they serve, the more complex implementing and maintaining these systems becomes. “Managing the security of multiple independent sites is usually considered an expensive proposition. Whether there are five, twenty, or one hundred sites to secure, hiring onsite staff to monitor and maintain independent systems at each location can be financially draining or even unrealistic for some companies. There are many aspects to consider such as the infrastructure needed to support the setting up of a command control room, and the bandwidth availability against the requirements of the surveillance system to provide stable connectivity. One challenge that immediately arises with this rich data of high-definition cameras is that it leaves the users scrambling for bigger hard drives and other storage solutions. At CP PLUS though, we understand how essential proper future proofing in the design and installation of your video surveillance system is. A proper assessment of your current and future needs, weighed against the predicted advances in video and storage technology, can go a long way towards helping you handle the humongous flood of information. Off-site managed servers, in particular, can provide you with unlimited future data storage options by CP PLUS”, says Mr. M.A. Johar, President of Government Business Vertical, CP PLUS. Access to and management of the rush of incoming video surveillance data from multiple sites posed a hurdle for

Managing the security of multiple independent sites is usually considered an expensive proposition. Whether there are five, twenty, or one hundred sites to secure, hiring onsite staff to monitor and maintain independent systems at each location can be financially draining or even unrealistic for some companies. There are many aspects to consider such as the infrastructure needed to support the setting up of a command control room, and the bandwidth availability against the requirements of the surveillance system to provide stable connectivity. M.A. Johar President of Government Business Vertical, CP PLUS

31

businesses and organizations spread over boundaries in enforcing proficient security measures and created inefficiencies. The Video Management System (VMS) by CP PLUS was designed with the aim to integrate this data as coherently as possible. Through VMS, the earlier awkwardly strung together systems can now produce perfect results by the system that has been crafted with an eye towards standardized, up-to-date software, hardware, and connectivity. A single, central platform is much easier to manage as it communicates with various components in a well-organized, methodical manner that is highly effective. Improvements in technology have greatly expanded the capabilities of security systems across various sites, making it easier to achieve multi-site coverage for access control and video with a reasonable investment that offsets the cost of retaining multiple systems in the long run. Mr. Johar comments, “Another overwhelming challenge is the amount of time and manpower that must be devoted to watching the collected video feed. These enormous quantities of video data translate into hours of manual review. Artificial intelligence-based solutions are becoming the primary solution to these challenges. Because – when properly trained – technology can consistently and accurately detect objects that human monitors may not, AI-backed video analytics are becoming a de facto standard for law enforcement worldwide.

32

MARCH 2023

www.asindia.in

Video surveillance comes with its own requirements and challenges, just like any critical commercial or institutional technology. But understanding the nature of those challenges and taking the proper steps to overcome them can help you enjoy the full benefits of this form of protection.” According to Kaushal Kadakia, Marketing Manager, Matrix Comsec., when it comes to multi-site video monitoring, there are several challenges that organizations must consider. There can be different types and brands of cameras, different models of HVRs, NVRs or DVRs, integrated or standalone video management software, and a variety of other components. As organizations scale up, new components have to be added to the existing infrastructure. The challenge is to check their compatibility and integrate them all into a single video surveillance system to ensure that they work together seamlessly. In the case of remote sites with limited connectivity or sites often facing power cuts, it becomes very difficult to transmit a large volume of data from multilocation cameras. This results in the interruption of live video feed, or loss of recorded video, which can be a cause of theft or crime. Maintenance is another consideration, as cameras can malfunction, cables can be damaged, and software may need updating. Finally, the cost of implementing a multi-site video monitoring system can often be daunting. Organizations must consider the costs of equipment, installation, and ongoing maintenance. They must also factor in the cost of monitoring personnel.

Addressing these challenges requires careful planning, design, and implementation of the video surveillance system. It is essential to work with experienced professionals to ensure that the system is reliable, secure, and meets the requirements of the locations being monitored. According to Gagan Lamba, Vice President, Enterprise Business, Prama Hikvision India Pvt. Ltd., the key challenges faced during Remote and Multi-site Monitoring Solution are quite comprehensive depending on the locations of the sites. However, the some of the challenges are: • Securing ATM with top brands, but no one to monitor cameras and health check-up of the system • Lack of Bandwidth in the remote branches. • No alternative solution and monitoring assets on a Realtime basis. • No specialized products • Lack of trained manpower for On-site monitoring and lack of trained manpower for Off-site monitoring. • Petty issues of Service from Vendors • Too Many Vendors Involved • No Reports & Recording when needed • Post-Mortem Strategy rather than Preventive Strategy • Managing everyone is a challenge. We offer our Integrated Panel Solution that integrates existing infrastructure in branches and makes useful Standalone System into a preventive system for Real time monitoring. These products are designed specially as per the needs of the bank, the way our ATM Cabinet’s designed especially for Remote Monitoring of ATM and all Hardware that are installed in branches. The ATM can be integrated

The cost of implementing a multi-site video monitoring system can often be daunting. Organizations must consider the costs of equipment, installation, and ongoing maintenance. They must also factor in the cost of monitoring personnel. Kaushal Kadakia Marketing Manager, Matrix Comsec to our Panel so this way one can avoid the challenge of integration of branches with the bank. We do assist banks in providing specialized vendor, who is trained for these Services and provide a costeffective service that gives return on investment and saves costs to the bank that are being incurred currently in branches and ATM. As an OEM our motto is providing the best- in -class service so we do assist Bank with audit facility of existing infrastructure and also do guide bank with designing of solution in such a way that it consumes minimum amount of

33

bandwidth. This system is easy to maintain with periodic maintenance. The biggest advantage of this system is that at any given point of time the bank officer or CSO can check with his mobile APP, whether the system is working or not. With Hikvision Smart Banking Solution bank CSO’s can monitor the branches to prevent incidents of crime. According to Ajay, Hanwha Well Multi site video Monitoring is on the top wish list of major companies having multiple offices / Branches / Factory. However, they have always been constrained due to High Bandwidth Cost, Cyber Security Risk, and High Availability. According to Parthesh Dhaggal, Founder, Enceplon., the challenges faced include inadequate infrastructure, remote areas, budget constraints, escalating cost, configuration management, security concerns, data storage issues due to sheer amount of data generated through multi -site video, anti-social and anti-national elements, terrorism, militancy, vandalism, inclement weather and natural disasters like flood, landslides, earth quake, forest fires Video surveillance system According to M.A. Johar, “Video surveillance is beneficial in protection against any number of issues as video surveillance systems are becoming more intelligent and effective day-

34

MARCH 2023

www.asindia.in

by-day, they can, very well, be used to increase efficiency and productivity in managing a variety of things. But before one evaluates systems, one should determine what type of cameras they want, what type of storage they need, and what sort of solution fits the specific requirements while considering all the areas they aim to protect. We, at CP PLUS, believe in providing a large degree of customization, which means that you can tailor the system according to your specific needs, whether the system is being installed in a shopping complex or police stations around the city, whether you need a widespread system that can cover multiple locations or a few cameras at your workplace - there’s a solution for everyone. We urge our customers to understand the disparity between indoor and outdoor cameras, as it is quite imperative to grasp the different purposes they serve. While outdoor cameras like PTZ can be used indoors, the reverse can’t be applied as indoor cameras can’t endure the extreme weather conditions or physical damage that outdoor cameras are designed to absorb”, continues Mr. Johar. Some systems are wireless and cloud-based, while others are hardwired into a monitor or recording unit. The number of cameras you need will vary depending on the size and layout of your business and we emphasize on the need for you to consider whether you need infrared cameras, weatherproof casings, or even motion-sensitive recording.

According to Kaushal Kadakia, with the increasing prevalence of remote work and the globalization of business, multi-site video monitoring has become a necessity. Businesses in all industries, retail, hospitality, healthcare, education, or logistics, rely on video surveillance to maintain visibility and control. Retail businesses, for example, use multisite video monitoring to check on their stores and warehouses to prevent theft. Transportation companies use multisite video monitoring to monitor their fleets, track shipments, and ensure compliance with regulations. The kind of video surveillance system varies from industry to industry, as it is necessary to consider the specific requirements of each industry. For example, a restaurant owner looking to build a chain of restaurants around the globe will require a surveillance system that is scalable. He will choose a video surveillance system where in different models of cameras and NVRs in different locations are compatible with each other. Oil and gas drilling and extraction operations are often located in remote areas, such as offshore rigs or desert fields, where network connectivity and power sources can be unreliable. This can make it difficult to monitor operations and ensure worker safety. Such sectors can go for IP cameras having a huge capacity for on-device storage. These cameras have an SD card slot that can store video data. NVRs having redundant capabilities that work even in the case of network or storage failures are also a good option. Centralized video monitoring is the top need of corporate multi-location offices. A CEO sitting at headquarters shouldn’t have to be calling a manager in a branch location to verify video recordings when there is a discrepancy. That CEO, or whoever is monitoring the camera system, should be able to check the system on the go, with 24/7 mobile access to whichever location he wants.

The integrated solution monitoring remotely through State-of-the-art Command Centre Software for Health of the Devices and physically monitoring the Integrated IP video surveillance systems along with some emergency sensors is a good choice for multi-site monitoring. Gagan Lamba Vice President, Enterprise Business, Prama Hikvision India Pvt. Ltd Matrix’s video surveillance system is an excellent solution for multi-site video monitoring in the present day. It offers scalability to support up to 65,535 cameras, 10,000 locations, and 1000 concurrent users, making it suitable for large-scale installations. In addition, Matrix’s system is compatible with other third-party systems, which provides flexibility to users who may have existing installations. Matrix’s Enterprise Grade Network Video Recorders come with four kinds of redundancies,

35

which ensure that there is no loss of footage in case of network, power, storage, or server failure. The clustering feature of Matrix NVRs allows users to connect up to 20 NVRs on a single platform. This enables central monitoring of multiple locations, without the need to invest in a separate VMS or server. Overall, Matrix’s video surveillance system is a comprehensive solution that meets the needs of modern multi-site video monitoring systems. According to Gagan Lamba, the integrated solution monitoring remotely through State-ofthe-art Command Centre Software for Health of the Devices and physically monitoring the Integrated IP video surveillance systems along with some emergency sensors is a good choice for multi-site monitoring. We at Hikvision offer a comprehensive range of Integrated Panels specially designed for Branches and ATM in Analog as well as IP; it is an Integrated Panel with compact Design, which are suitable for Multi-Site Monitoring. These Panels are integrated with various Alarm Sensors, Panic Switches, and Fire Sensors and our Multi-site Video Monitoring solutions software available in Command Centre as well as Unique Mobile APP. can remotely monitor Energy Monitoring Devices all the Sensors and Cameras. By providing centralized remote surveillance and alarm monitoring, Hikvision has implemented an IP based Video Surveillance and Remote Monitoring Solution for some of the leading Public and Private sector

36

MARCH 2023

www.asindia.in

Banks. Remote monitoring helps to monitor and use the video data for business intelligence and betterment of processes for multiple branches and Multi-site scenarios. According to Ajay, Hanwha., Selecting Future Proof Video Surveillance should always be given priority to address the need of future. AI Based Compression: Cost of Bandwidth, Storage and Server amplifies if the selected product is not enabled with AI Based Compression Technology like Hanwha Cameras are powered with WiseStreamII & III Compression Technology which is one of our key differentiator that effectively retains high video quality at low data size. The technology enables users to efficiently process more high-quality footage without installing additional network and storage devices. Cyber Security: Cyber Security has been the worrisome subject across the globe and it is of prime important that 7 Major Concerns of Cyber Security be effectively addressed and the Device should be subjected to Penetration Test to check for any vulnerabilities. Concern 1) Can hackers gain access to my network by contaminating my video surveillance devices? Concern 2) Is there a possibility of data leakage during communication between interconnected video surveillance devices (e.g. Camera-server)? Concern 3) Can a third party read or alter my video footage?

Concern 4) Can malicious software break into my security devices through firmware or open and run platform applications? Concern 5) Can malicious software break into my security devices through firmware or open and run platform applications? Concern 6) Do I have to configure the product on my own to make the product secure? Concern 7) What can I do in the case that I find a security vulnerability in the product? At Hanwha all our Product line are subject to PEN Test as per OWASP Top 10 IOT risk assessment criteria and 7 Concerns have been efficiently addressed. Thanks our in-house designed System on Chip Wisenet-7 which is especially designed to meet the highest cyber security Standards. Analytics : Edge Based AI Analytics is most in need which ensures to fulfil Security and Business needs on the edge. At Hanwha we have been pioneer in providing customer AI Based Business Analytics like Queue Management, Mask Detection People Counting, Attribute Search Human / Vehicle, Heat Map and other Security Analytics like Virtual Line, Appear Disappear, Audio Analytics and many more. Deep Level Integration with VMS Provider : It is always recommended to ensure cameras are able to share Metadata of Various Edge Based analytics with VMS Provider so that customers are able to utilize every features available. According to Parthesh Dhaggal, for selecting the right kind of surveillance system is really a challenging task with so many products flooding the market. It is important that we first ensure the system to be wired or wireless, it has critical elements, and components such type of cameras, type of storage NVR, DVR and hybrid, quantum of storage.

Cyber Security has been the worrisome subject across the globe and it is of prime important that 7 Major Concerns of Cyber Security be effectively addressed and the Device should be subjected to Penetration Test to check for any vulnerabilities. Ajay Dubey Country Manager at Hanwha Vision, India In addition, the system should have essential features like night vision, smart motion detection and pan/tilt/ zoom (PTZ), all weather functionality Motion Activated Recording Expansive Field of View, Recording Frame Rate Digital Zoom, Audio Recording, Remote Viewing, Remote Alerts Scheduled Recording, Multi-camera Live Viewing, Multi-camera Playback, Object Search and last but not the least price and warranty. Latest transformations for multi-site video monitoring

37

According to M.A. Johar, “With the development of new video technologies such as 4K, 8K, augmented reality (AR), virtual reality (VR), and 360° panoramic video, IP videos are being applied and popularized in multiple sectors. In the era of ultra-high definition (UHD) video, innovators and early adopters are embracing new technologies that enable a more immersive experience, which is made possible by the new video services mentioned above. Providing that multi-screen integration service is the future of the industry, consumer behavior is constantly being affected. The unique fusion of video synopsis and deep learning solutions enables rapid video review and search, facial recognition, real-time alerting, and quantitative video insights. These real-time alerting capabilities enable organizations to proactively respond to situational changes in their environment. The Real-Time Edge Video Analytics for Multicamera Privacy-aware Pedestrian Tracking, as an integrated end-to-end IoT system for privacy built-in decentralized situational awareness, presents novel algorithmic and system constructs to push deep learning and video analytics next to IoT devices (i.e. video cameras). On the algorithmic side, this technology proposes a unified integrated and computer vision pipeline for detection, re-identification, and tracking across multiple cameras without the need for storing the streaming data. On the IoT system side, it provides infrastructure to maximize hardware utilization

38

MARCH 2023

www.asindia.in

on the edge, orchestrates global communications, and provides system-wide re-identification, without the use of personally identifiable information, for a distributed IoT network.” Moreover, recent advances in machine learning, particularly deep learning, have driven the development of more advanced video analytics and surveillance technologies. This includes everything from simple license plate scanners that search for stolen vehicles, to facial-recognition and even pedestrian tracking. We are certain that in the coming time, we’ll keep on ameliorating the current video surveillance technology to further ease the life of the public across the nation and beyond.” According to Kaushal Kadakia, all over the world, people are migrating towards cloud-based technology. Following suit, Cloud-based video surveillance is becoming increasingly popular for multi-site monitoring. It allows for easy access to video feeds from anywhere with an internet connection. It eliminates the need for on-site hardware and software, making it more cost-effective and scalable. Edge computing is becoming increasingly popular for multi-site video monitoring. It processes video feeds in real time at the network edge instead of sending them to a central server for processing. This enables the system to function even if network connectivity between edge devices and the server is disrupted. Edge computing is particularly useful in remote locations with poor network connectivity, as it reduces latency and improves overall system performance.

Finally, cybersecurity will become a necessity for multi-site video monitoring as more systems become vulnerable to cyber threats. This helps to safeguard sensitive data and ensure that the system remains operational even in the face of potential cybersecurity breaches. According to Gagan Lamba, the new technologies and trends like AI, AI Cloud, Deep Learning, IoT -Internet of Things, IoST-Internet of Safety Things and Big Data are empowering multi-site video monitoring. We are implementing new technologies and application like Artificial Intelligence (AI), Deep Learning and IoT to enhance the value of Remote Monitoring Solution, thanks to the AI applications including Face recognition (Rich applications for various scenarios), Data Visualisation (Making operation more data driven) and Behaviour Analysis (Quick response to emergency events). The E-Surveillance solutions with All-in One solution, where our Video Surveillance, Intrusion, Fire, and all the key security systems are integrated. It is a big step towards multi-site integrated video surveillance monitoring. According to Ajay, Hanwha., multi-Site Video Monitoring should make full use of analytics & AI Based Compression Technology that greatly reduces false alarms, enhances the system capability and provides End-to-End Encryption of Video data. According to Parthesh Dhaggal, VOC or Video Analytics On Cloud, VConnect for remote monitoring for multiple sites, Intelligent Video Analytics, Granular Analytics for high quality viewer experience, Remote Health Monitoring Services, Blockchain, Artificial Intelligence, Augmented Analytics and Quantum Computing, Deep Learning Driven Video Analytic to turn raw video data into actionable insight. Cloud VMS solutions give freedom to develop and deploy client application environment on any type of devices. User can just login to the web / mobile application

The challenges faced include inadequate infrastructure, remote areas, budget constraints, escalating cost, configuration management, security concerns, data storage issues due to sheer amount of data generated through multi -site video, anti-social and anti-national elements, terrorism, militancy, vandalism, inclement weather and natural disasters like flood, landslides, earth quake, forest fires. Parthesh Dhaggal Founder, Enceplon

to access the video surveillance from any device, anywhere, and anytime. We at Enceplon offer multi- site Remote Health Monitoring Services (RHMS) with automatic regular updates and alerts to our clients.

39

Electronic Safes & Electronic safes & digital locks ensure utmost security

A

n electronic lock (or electric lock) is a locking device, which operates by means of electric current. Electric locks are sometimes stand-alone with an electronic control assembly mounted directly to the lock. Electric locks may be connected to an access control system, the advantages of which include: key control, where keys can be added and removed without re-keying the lock cylinder; fine access control, where time and place are factors; and transaction logging, where activity is recorded. Electronic locks can also be remotely monitored and controlled, both to lock and to unlock. A safe (also called a strongbox or coffer) is a secure lockable box used for securing valuable objects against theft or fire. A safe is usually a hollow cuboid or cylinder, with one face being removable or hinged to form a door. The body and door may be cast from metal (such as steel) or formed out of plastic through blow molding. Bank teller safes typically are secured to the counter, have a slit opening for

40

MARCH 2023

dropping valuables into the safe without opening it, and a time-delay combination lock to foil thieves. One significant distinction between types of safes is whether the safe is secured to a wall or structure or if it can be moved around. A less secure version (only suitable for petty cash) is usually called a cash-box. Importance of electronic safes and digital locks. According to Parthesh Dhaggal, Founder, Enceplon., electronic safes and digital locks are still important because they provide enhanced safety and security. They ensure that except the legitimate owners and users none can have access to the contents inside the electronic safes. They help to foil the attempts of burglars and intruders and keep the precious things safe and intact. Keyless electronic safes and digital locks eliminate the need for keys and thereby ensuring that no

www.asindia.in

intruder will ever come across a key that allows him or her access to your property and thus giving you peace of mind. They are convenient, reliable and easy to operate. In addition, they can be operated remotely via mobile phones. Hence their relevance and importance. Use of electronic safes digital locks According to Parthesh Dhaggal, there are advantages, there are also downsides like 1. ectronic devices are expensive.2. Poor resistance to water and chemical damage and hence, safe owners should consider a proper place that is dry for their electronic safes. Even a small amount of liquid (water, soda, chemicals for washing) could cause serious damage.3. Battery replacement: The keypad in the digital safe runs with a battery. The battery may die when the safe has not been used for a long time. As batteries have short life they have to be replaced occasionally. 4. If you forget codes, it’s easy to get panic and turn the lock into lockdown after 3 or 5invalid try-outs. If it is an emergency situation, it would cause unnecessary problems Latest innovations in electronic safes and digital locks. According to Parthesh Dhaggal, the latest innovations include keyless locks, keyless mobile locking system, high security safes, fire safes, biometric safe locker, classic finger print safe locker, smart security safe locker with pin code access, voice-based safe locker, mobile phone operated safe lockers, time specific safe locker, automatic locking and unlocking system. WIFI Smart Locks and Key Fob Locks. In addition, there are digital electronic safe locks designed to raise an alarm when continuous wrong inputs of lock combination are entered. Some send alerts when a wrong person attempts to open the electronic safe.

41

PRODUCT SHOWCASE iDS-2CD8426G0/F-I DeepinView Dual-Lens Face Recognition Camera

Hikvision MinMoe Face Recognition Terminal Model – DS-K1T671 Series

iDS-2CD8426G0/F-I adopts advanced deep learning algorithm and powerful GPU to realize instant face detection, capture and comparison to accomplish face recognition and related alarm triggering.

FEATURES == 7-inch touch screen, 2 Mega pixel wide-angle lens == Adjusts supplement light brightness manually == Face recognition in dark environment == Face recognition distance: 0.3m to 3m == Suggested height for face recognition between 1.4 m and 1.9 m == Deep learning algorithm == 6,000 face capacity, 5,000 fingerprint capacity, and 50,000 event capacity == Face anti-spoofing == Multiple authentication modes == Face recognition duration < 0.2 s/User; face recognition accuracy rate ≥ 99% == Stand-alone operation == Transmits data to the client software via TCP/IP communication and saves the data on the client software == Capture linkage and captured pictures saving == Manage, search and set device data after logging in the device locally == Connects to one external card reader or access controller via RS-485 protocol

FEATURES == 1/2.8”Progressive Scan CMOS == 1920 x1080 @30fps == 120dB WDR == H.265+, H.265, H.264+, H.264 == 5 video streams == Face recognition == IR range up to 10 m

DS-2CD2146G1-IS 4 MP Outdoor AcuSense Fixed Dome Camera

AX PRO Series Wireless Intrusion Alarm System DS-PWA96-Kit-WB/ DSPWA64-Kit-WB

FEATURES == 1/2.7” (4 MP) Progressive Scan CMOS == 2688 x 1520 Resolution @ 30 fps == EXIR 2.0 Range Up to 100 ft (30 m) == 2.8 mm, 4 mm, or 6 mm Fixed Lens == H.265+, H.265, H.264+, H.264 == 120 dB True WDR == MicroSD Card Slot Supports 128 GB

It is an intelligent alarm system with convergent solutions. Hikvision AX PRO wireless alarm system, includes highly reliable video verification solutions, secure wireless transmission, and a wide range of state-of-the-art alarm detectors. It’s application scenarios include Residential, Commercial, Retail, Warehouses, Logistics, Education, PPOG, BFSI and Religious Places, etc. FEATURES == 96 Device Connectivity == Duel Sim 4G Support == Effective Range -4800 MTR == TRI –X and CAM-X Wireless Technology == On-board Video Verification == Home automation == On Board Lan , Wi-Fi, 4G Module

XNV-9083RZ 8MP AI PTRZ Vandal Dome Camera

CP-UNC-DB21L3C-MDS-V2 2MP WDR Network IR Dome Camera - 30Mtr. FEATURES == 1/2.8” 2Megapixel PS CMOS Image Sensor (0.9071 centimeters) == Max. 2MP(1920x1080)@25/30fps == Instastream and H.264+ Dual-stream encoding == WDR(120dB), Day/Night (ICR), 3D-DNR, ROI, AWB, AGC, BLC, HLC == 3.6mm Fixed Lens (2.8mm Optional) == IR Range of 30 Mtrs, IP67, Micro SD Card, PoE == Support Built-in Mic == Support Starlight Technology == Mobile Software: iCMOB, gCMOB == CMS Software: KVMS Pro

42

MARCH 2023

www.asindia.in

FEATURES == 8MP resolution == 4.4~9.3mm (2.1x) motorized varifocal == Maximum 30 fps (H.265/H.264) == IR viewable length: 15m (49.21ft), 30m(98.43ft) based on scene == Day & Night (ICR), extremeWDR (120 dB) == Hard-coated dome bubble == Analytics events based on AI engine (NPU) : Object detection (Person/Face/Vehicle - car, truck, bus, bicycle, motorcycle/License plate), IVA (Virtual line/Area, Enter/Exit, Loitering, Direction, Intrusion) == Analytics events : Defocus detection, Motion detection, Tampering, Fog detection, Audio detection, Sound classification, Shock detection, Appear/Disappear == IP66/IP67/IP6K9K, NEMA4X, IK10+

PRODUCTSHOWCASE SHOWCASE PRODUCT XNV-8083Z 6MP AI PTRZ Vandal Dome Camera FEATURES == 6MP resolution == 4.4~9.3mm (2.1x) motorized varifocal == Maximum 30 fps (H.265/H.264) == Day & Night (ICR), extremeWDR (120 dB) == Hard-coated dome bubble == Analytics events based on AI engine (NPU) : Object detection (Person/Face/Vehicle - car, truck, bus, bicycle, motorcycle/License plate), IVA (Virtual line/Area, Enter/Exit, Loitering, Direction, Intrusion) == Analytics events : Defocus detection, Motion detection, Tampering, Fog detection, Audio detection, Sound classification, Shock detection, Appear/Disappear == IP66/IP67/IP6K9K, NEMA4X, IK10+

Standard 5MP Motorized Illustra Standard V/F IR Smart Bullet4MP Illustra Standard 4MP Box Camera Network Camera Box TheCamera Illustra Standard Box Camera by American

FEATURES The Illustra Standard Box American Dynamics captures highCamera quality by colored Images == 5MP resolution H.265 Dynamics captures high quality colored Images == 30fps@5MP, 60fps@2MP == True day / night FEATURES == to Light 70m IR distance Environment with Smart IR == Up Low Conditions FEATURES == Auto focus by motorized V/F lens ==Low 4MP resolution ==== Light Conditions Environment True WDR, up to 120dB ==4MP 30resolution fps high ==== 3D DNR, HLCframe & BLCrate ==30 140dB WDR ==== fps high frame rate Smart codec by ROI ==140dB PoE WDR ==== 2-way audio & alarm in/out ==PoE 3D DNR storage ==== Onboard ==3D Wide of applications. Advanced intelligent video analytics ==== DNR varieties Facevarieties detection / capture ====Wide of applications. == Smart non-false alarm == IP67 / IK10

PRODUCTSHOWCASE SHOWCASE PRODUCT

XNV-8083RZ 6MP AI PTRZ Vandal Dome Camera FEATURES == 6MP resolution == 4.4~9.3mm (2.1x) motorized varifocal == Maximum 30 fps (H.265/H.264) == IR viewable length: 15m (49.21ft), 30m(98.43ft) based on scene == Day & Night (ICR), extremeWDR (120 dB) == Hard-coated dome bubble == Analytics events based on AI engine (NPU) : Object detection (Person/Face/Vehicle - car, truck, bus, bicycle, motorcycle/License plate), IVA (Virtual line/Area, Enter/Exit, Loitering, Direction, Intrusion) == Analytics events : Defocus detection, Motion detection, Tampering, Fog detection, Audio detection, Sound classification, Shock detection, Appear/Disappear == IP66/IP67/IP6K9K, NEMA4X, IK10+

XNV-6083Z 2MP AI PTRZ Vandal Dome Camera FEATURES == 2MP resolution == 2.8~12mm (4.3x) motorized varifocal == B/W : 0.001Lux(F1.4, 1/30sec, 30IRE), 30/25fps == Maximum 120fps/100fps(60Hz/50Hz)(WDR off) == Day & Night (ICR), extremeWDR (150 dB) == Hard-coated dome bubble == Analytics events based on AI engine (NPU) : Object detection (Person/Face/Vehicle - car, truck, bus, bicycle, motorcycle/License plate), IVA (Virtual line/Area, Enter/Exit, Loitering, Direction, Intrusion) == Analytics events : Defocus detection, Motion detection, Tampering, Fog detection Audio detection, Sound classification, Shock detection, Appear/Disappear == IP66/IP67/IP6K9K, NEMA4X, IK10+

Illustra Standard 2MP IR Illustra Standard 2MP IR Standard 5MPCamera Motorized Network PTZ Illustra PTZ Standard 4MP Network Camera Illustra Standard 4MP V/F Smart Dome Especially designed for deployment in securityBoxIRCamera Especially designed in capabilities securityBox Camera critical environments. Powerful PTZ Network Camerafor deployment The Illustra Standard Box Camera byofcapabilities American critical environments. Powerful PTZ in Illustra terms of speed, agility and ease deployment The Standard Box Camera by American Dynamics captures high quality colored Images FEATURES in are terms ofcaptures speed, agility and ease ofquickly deployment vital to locate, track and zoom onto the Dynamics high quality colored Images == 5MP resolution H.265 are vital to locate, track and zoom quickly onto the security situation area. == 30fps@5MP, 60fps@2MP FEATURES security situation area. == True day / night FEATURES == Up Low Conditions Environment to Light 50m IR distance with Smart IR FEATURES ==== Low Light Conditions Environment == 4MP resolution == Auto focus by motorized V/F lens ==4MP 2MP (1920 xframe 1080)rate resolution FEATURES == resolution == 30 fps high == True WDR, upZoom to 120dB ==30 36X Optical 2MP xframe 1080)rate resolution ==== fps(1920 high 140dB WDR == 3D DNR, HLC & BLC ==140dB 200m IR Distance 36XPoE Optical Zoom ==== WDR == Defog == 120dB True WDR 200m IR Distance ==== ==PoE 3D DNR Triple streams == Backlight Compensation 120dB WDR ==== DNRTrue ==3D Wide varieties applications. Smart codec byofROI ==Wide Optical Defog Backlight Compensation ==== varieties of applications. 2-way audio & alarm in/out ==Optical Hi-PoE / 24VAC power supply ==== Defog Onboard storage ==Hi-PoE IP67, IK10 ==== / 24VAC power supply Advanced intelligent video analytics ====IP67, FaceIK10 detection / capture == Smart non-false alarm == IP67 / IK10

PRODUCTSHOWCASE SHOWCASE PRODUCT

Illustra Standard 2MP IR IllustraStandard Pro Gen32MP Mini-Dome Standard 4MP Illustra Illustra Standard 4MPIR Network PTZ Camera Illustra Pro Gen3 Mini-Dome Available in aCamera range of resolutions and lens V/F IR Standard Turret Network Network PTZ Illustra 4MP Box Camera Especially for securityAvailable aGen3 range of deployment resolutions and lens options, inthedesigned Mini-Dome can be in added to a Camera Especially designed forBox deployment securityBox Camera critical environments. Powerful PTZ capabilities The Illustra Standard Camera byinadded American options, the Gen3 Mini-Dome can be to a

variety of deployments in both medium- and largecritical environments. Powerful PTZ The Illustra Standard Box Camera by American FEATURES in terms of speed, agility and ease ofcapabilities deployment Dynamics captures high quality colored Images variety offacilities. deployments in both mediumand largesized in terms and ofquickly deployment == facilities. 4MP H.265 Dynamics captures high colored Images are vitalofresolution, tospeed, locate,agility trackquality and ease zoom onto the sized == 30fps @ 4MP areFEATURES vital to situation locate, track security area.and zoom quickly onto the FEATURES == True day / night security situation area. == FEATURES == Low Up toLight 8 MPConditions @30 fps Environment == Up to 50m IR distance ==Low 4MP resolution Conditions Environment == Quad Streaming ==== Up toLight 8 Dynamic MP @30 fps Wide Range FEATURES == 30 fps highIRframe rate == resolution FEATURES == Integrated == HLC &(1920 BLC Quad Streaming ==4MP 2MP x 1080) resolution == 140dB WDR ==== fps(1920 high rate 2MP xframe 1080) resolution Triple streams ==30 120dB True WDR Integrated IR == 36X Optical Zoom == PoE ==== WDR Smart codec by ROI 36X Optical Zoom ==140dB Integrated Video Analytics 120dB True WDR == 200m IR Distance == 3D DNR PoE power supply ==== 200m IR Distance ==PoE Proprietary Intellizip Technology Integrated Video Analytics == 120dB True WDR == Wide varieties of applications. == Basic intelligent video analytics ==== DNRTrue 120dB WDR ==3D IP67, IK10Intellizip Proprietary Technology Backlight Compensation == IP67/IK10 ====Wide varieties of applications. Backlight IP67, IK10Compensation Optical Defog NDAADefog Compliant ==== ==Optical Hi-PoE / 24VAC power supply ====Hi-PoE / 24VAC power supply IP67, IK10 == IP67, IK10

For Inquiries on Product Showcase, Please Contact MARCH 2020 50 us - [email protected]

50

MARCH 2020

www.asindia.in www.asindia.in

43

HID Mobile Access Solutions

HID® Signo™

FEATURES With HID Mobile Access, you can use a mobile device as a credential to access doors, networks, services and more. Leveraging Seos® as its underlying credential technology, HID Mobile Access can significantly increase convenience, boost efficiency and maximize security. == Increase Convenience == Boost Efficiency == Maximize Security == Native Touchless

FEATURES The Signature Line of Access Control Readers

Learn More: https://hid.gl/ogd

HID Signo Readers offers unparalleled security by providing a simple and effective approach to secure access control via a multi-layered security model that ensures data authenticity and privacy. == Highly Versatile: Support for the widest range of credential technologies, including HID Mobile Access via native Bluetooth and Near Field Communication (NFC) capability. Plus Apple’s Enhanced Contactless Polling (ECP) to support credentials in the Apple Wallet. == Unparalleled Performance: Ultra secure storage of cryptographic keys on certified secure element hardware, plus a new surface detection feature that allows the reader to automatically recalibrate and optimize read range performance. == Connected to the Future: All readers include out-of-the-box support for Open Supervised Device Protocol (OSDP) for secure bidirectional communication. Each reader is also designed to be connected and managed remotely without “sneakernet” or needing to be physically touched. Learn More: https://hid.gl/ogP

HID Signo Biometric Reader 25B

HID® Aero™ Controllers

FEATURES The HID® Signo™ Biometric Reader 25B supports a wide range of biometric operating modes including storing fingerprint template on card or on device with two-factor authentication for additional security. The reader is also capable of supporting a large range of different credential technologies in a variety of form factors including cards, fobs and mobile devices.

FEATURES The HID Aero Controller product line provides a complete and fully functional hardware, firmware, software library and tool infrastructure accompanied by an API integration package for access control software providers. == Open Architecture – The ability to work with a variety of software partners over time without any re-investment in hardware. == Highly Durable and Reliable – Trusted hardware designed to operate in the most demanding access control environments. == Futureproof Platform – Highly configurable and ready to grow to meet future needs. == Based on Mercury Technology – Built on a proven platform, leveraging the expertise gained from over 25 years serving large enterprise customer needs.”

It also introduces an API for integration with our partners access control software solutions. This enables a single point of biometric template enrollment through the access control system and the ability to push biometric templates to all connected devices simultaneously. Learn More: https://hid.gl/ogW

Learn More: https://hid.gl/ogm

NAS N300 series FEATURES == Industry Standard 3.5-inch FF with SATA 6Gbit/s Interface == 9-disk helium-sealed CMR having FC-MAMR technology == 7200rpm and 512 MB Cache delivers a consistent high level of performance with a sustained transfer rate of 268 MB/s. == 180 Total TB Transferred per Year Workload Rating == Rotational Vibration (RV) Sensors for eliminating the possibility of ‘knock-on’ vibration in multi-bay NAS configuration systems. == Support multi-RAID systems with up to 8 hard disk drives. == 3 years of warranty. Applications: == Branch-office / Remote-office Networked File Storage == File and Object storage solutions == Archiving and data back-up == Consumer NAS file storage == Private cloud server and storage Video URL - https://youtu.be/7De3Ez4kyus For more details - https://www.toshiba-storage.asia/n300-nas-hard-drive/

44

MARCH 2023

www.asindia.in

Surveillance Hard Disk Drive S300 Pro series - HDWTxxx FEATURES == Choice of 10TB, 8TB, 6TB Storage Capacity. == Support for up to 64 HD Cameras. == MTTF 1M hours. == 7200 Rpm, 256 MB dynamic Buffer. == 180 Total TB transferred per year work load rating. == Designed for 24x7 operation and up to 600K Load/unload cycles. == Rotational Vibration (RV) sensors for higher reliability in RAID/multi-HDD platforms == 3 years of standard warranty.

InBio Series Multi door Controller

C3 Series Multi door Controller

FEATURES == Door types- 1 door, 2 doors & 4 doors == Card holder capacity 30,000 == Fingerprint capacity 3,000 == Log events capacity 100,000 == Communication TCP/IP, RS-485 & Weigand

FEATURES == Door types- 1 door, 2 doors & 4 doors == Card holder capacity 30,000 == Log events capacity 100,000 == Communication TCP/IP, RS-485 & Weigand

mTS1000 Tripod Turnstile

FBL300 Flap Barrier

FEATURES == SUS304 stainless steel housing == Bi-directional tripod turnstile with arm drop function == LED pictogram for intuitive use == High throughput rate == Easy and simple installation process

FEATURES == SUS304 stainless steel casework ensure long-lasting durability. == High quality electrical components. == Barriers retract automatically during power outage with battery installed. == All smooth finish. No exposed screws. == LCD on the flap barrier control board, easy operation.

Enterprise Hard Drive MG08-D series

Canvio Flex External Portable HDD Smart Storage. Made to adapt. For Mac. PC and Tablets.

FEATURES == Industry Standard 3.5-inch 26.1mm Height Form Factor == 4TB / 6TB / 8TB Capacity options == 7200rpm Performance, 256 MB Cache == Choice of SATA 6Gbit/s or Dual-Port SAS 12Gbit/s Interface == 550 Total TB Transferred per Year Workload Rating == AFR (Annualized Failure Rate) is 0.44% == Choice of 512n or 512e (Advanced Format) Sector Technology Applications: == Engineered for Mid-line / Nearline Business Critical Workloads == Tier 2 Business-Critical Servers and Storage Systems == Servers Supporting Workloads that Benefit from Higher Capacity per Spindle == Capacity-Optimized Data Center Storage Systems == IT infrastructure designed around Enterprise Capacity HDD performance

Combining compatibility and portability, the Canvio Flex is the cross-device storage solution built for your digital lifestyle. FEATURES == 2.5“ Portable hard drive == 1TB, 2TB and 4TB of storage capacity to store your growing files and content == Compatible with Mac / Windows PC / Tablet == Includes USB type-C and USB type-A cable == Elegant Silver finish == 3 years warranty

For Inquiries on Product Showcase, Please Contact us - [email protected]

45

Aperio E100 EURO Standard escutcheons FEATURES == Designed to fit with Mechanical Mortise Locks == External Lever locked, Internal Level set for Free Egress == Supports multiple high frequency RFID technologies == Battery life of 40,000 operations == Stores last 200 events and audit trails locally in the lock == AES128 Bit Encrypted radio communication

Aperio C100 Cylinders

FEATURES == Modes of Access: Fingerprint Access, RFID Card, User Password, Emergency Key, OzoLife Mobile App == Suitable for Wooden and Aluminium Frame doors with thickness of 35-80mm == Super Slim design, Universal handle for Left/Right Door Opening == Two types of Mortised Lock Bodies: Swing Door & Sliding Door == Supports Time-Limited Password and One Time Password == Secured with Anti-Theft Password Technology & Auto-Secure feature == Check Logs for lock access, Get App Alerts for Lock openings and unauthorized attempts == Upto 300 total user capacity (can have up to 100 fingerprints)

eff eff 509X Motorized Lock FEATURES == High Security motorized bolt retraction lock for integration with automation systems == Universal DIN handling used with double action latch and switchable control latch == Changeover function for unlocking with a key from the outside == Monitoring functions include DPS, Deadbolt and Key Override == Burglary-resistant up to Class 2 due to hardened solid bolt with 20mm throw == Suitable for fire doors in accordance with EN1125 standards

MARCH 2023

FEATURES == Modes of Access: Fingerprint Access, RFID Card, User Password, Emergency Key, OzoLife Mobile App == Suitable for Internal doors with thickness of 35-80mm == Supports Time-Limited Passwords, One Time Password, Dynamic Password, and Custom Password == Pull-Push design - Open without turning any handle, supports Auto-locking == Secured with Temper Alarm, Anti-Theft Password Technology & Auto-Secure feature == Features include Passage Mode, Privacy Locking, Dual Combination mode, and Doorbell == Check Logs for lock access; get App Alerts for Lock openings and unauthorized attempts == Up to 150 total user capacity (can have up to 50 fingerprints) == External Micro-USB for emergency battery backup; use any 5V DC power source

Narrow Style Smart Door Lock (OZ-FDL-33 LIFE SL STD and OZ-FDL 33 SW STD)

FEATURES == Freely rotating lock cam, compatible with all DIN mortice locks == Retrofit Solution == Single or double side cylinders available == 128-bit AES encrypted radio communication == Can store up to 10 override credentials in case of an emergency failure

46

UNIQ Smart Door Lock (OZ-FDL-05 LIFE STD)

www.asindia.in

Glass Door Lock Glass to Glass (OZ-FGL-LIFE G2G and OZ-FGL-LIFE G2W) FEATURES == Modes of Access: Fingerprint Access, RFID Card, User Password, OzoLife Mobile App, == Cut-out Free installation, supports Installation for Left/Right Door Opening == Suitable for Glass Door thickness of 10-12mm == Features include Automatic Locking, Passage Mode and Doorbell, support RF remote unlock (sold separately) == Secured with Anti-Theft Password Technology & Auto-Secure feature == Check Logs for lock access, Get App Alerts for Lock openings and unauthorized attempts == 600 total user capacity (can have up to 200 fingerprints) == External Micro-USB for emergency battery backup; use any 5V DC power source

Matrix SATATYA PARAM NVR6404X 64 Channel Extreme Series NVR with 4 SATA Ports

Matrix SATATYA SAMAS: Video Management Software

FEATURES == Higher Throughput of 512 Mbps == Ultra HD (4K) Decoding and Smooth Streaming == 12 MP Resolution Recording Capacity == Allows Cascading of up to 20 Devices == RAID-0, RAID-1, RAID-5, RAID-10 Support == Adaptive Recording Saves Storage Space == Proactive Actions Based on Various Events

Matrix COSEC ARGO FEATURES == Multiple User Credentials - Fingerprint, BLE, RFID, PIN == High Storage Capacity - 50,000 users profiles, == 25,000 Fingerprints Storage == 5,00,000 Events Storage == Certified protection against Ingress and Vandal == Ethernet, WiFi, PoE, BLE, USB, 3G/4G/LTE Connectivity == Multiple Interfaces - Wiegand, RS-232, Exit Switch Interface, Door Lock Relay

Morphy Nxt (OZ-FDL-01 LIFE NXT) FEATURES == Modes of Access: Fingerprint Access, RFID Card, User Password, Emergency Key, OzoLife Mobile App == Ideal for External wooden & Metallic doors with a thickness of 35-80mm, Universal Handle for Left/Right Door Opening == Lock & Unlock Anytime, Anywhere with a Wi-Fi gateway (sold separately) == Supports Dynamic Password and Custom Password == Features include Passage Mode, Dual Combination mode, and Doorbell == Secured with Temper Alarm, Anti-Theft Password Technology & Auto-Secure feature, Child Safety Switch, and Night Latch == Check Logs for lock access, Get App Alerts for Lock openings and unauthorized attempts == Upto 150 total user capacity (can have up to 50 fingerprints) == Available in Grey and Rose Gold Finish

FEATURES == Single Platform for all Security Devices: Supports Matrix and Third Party IPC and NVRs == Highly Scalable: 65,535 Cameras, 10,000 Locations and 1000 Concurrent Users == Hierarchical Video Surveillance Solution: Helps Define Rights Based on User Profile == Multi-layer E-map to Navigate Between Buildings, Floors, and Camera == Proactive Surveillance with CREAM: Automate Actions Based on Events == Advanced EIVA: Weighbridge Integration, ANPR, and Parking Management == Daily Reports and Highlights: Camera Wise Reports, System Health Reports == Cloud Ready: Can Be Hosted on Private and Public Cloud

Matrix COSEC Contract Workers Management FEATURES == Centralized Monitoring and Control with Real-time Status Updates == Contactless Credential such as Face Recognition, BLE == Smart Mobile Application for Field Application == Contractor Self-service Portal to Manage Labor Workflow == Third-Party Integration such as Payroll Management, Device Configuration, etc == Intuitive Dashboard with Easy Worker Attendance Management

ALGATEC In-built Reed Switch Electromagnetic Lock- UL275BWM-SL FEATURES == UL275BWM-SL has in-built electronic door contact panel, no moving part, less wiring hazzles hence more stable and consistent performance. == Enhanced door status monitoring function with Reed Switch. == Lock status monitoring function with built-in bond sensor & LED. == It could generate holding force up to 600lbs and with easy installation.

For Inquiries on Product Showcase, Please Contact us - [email protected]

47

UNION BUDGET

Post Budget Reaction An Inspiring & Growth Propelling Union Budget 2023-24

A

ccording to Mr. Ashish P. Dhakan, MD & CEO, Prama Hikvision India Pvt. Ltd., the Union Budget 2023-24 clearly has the visionary roadmap to put India on the path to become $5 trillion economy. The seven priorities of the budget ‘Saptarishi’ are inclusive development, reaching the last mile, infrastructure and investment, unleashing the potential, green growth, youth power and financial sector. It shows the government’s vision and missionary zeal for a developed India.

Ashish P. Dhakan

MD & CEO, Prama Hikvision India Pvt. Ltd.

We welcome the growth-oriented budget positively as it is aimed at furthering the cause of the Indian manufacturing industry. The Union Budget has the blueprint of a sustainable economic growth in Amrit Kaal (Amrit Kaal refers to the next 25 years (up to 2047) leading to the centenary of India’s independence), backed by consistent and well-planned strategy. It also shows the strong commitment towards electronic manufacturing sector and infrastructure development. The budget shows clear intent to offer calibrated Customs Duty Rates to provide a graded rate scheme to facilitate domestic electronic manufacturing sector. The government’s commitment to empowering the youth by introducing mandatory courses such as AI, coding, drones, IoT, 3D printing, and other soft skills under Pradhan Mantri Kaushal Vikas Yojana 4.0 and establishing of 30 Skill India international centers, will connect skilled youth with employers and leaders in the industry and encourage entrepreneurship. As an integral part of India’s fast developing electronic security manufacturing ecosystem, we are sure

48

FEBRUARY 2022

www.asindia.in

that this Union Budget will help to realize the vision of ‘Surakshit Bharat’ (Secure India) through the ‘Atmanirbhar Bharat’ (Self-Reliant India) roadmap. From the security industry perspective, this is an industry friendly budget as it acknowledges MSMEs as growth engines of the economy, the Budget proposes enhanced limits for micro enterprises and certain professionals for availing the benefit of presumptive taxation. To support MSMEs in timely receipt of payments, the Budget allows deduction for expenditure incurred on payments made to them only when payment is actually made. The Union Budget offers a solace to the MSME sector. The revamped credit guarantee scheme for MSMEs to take effect from 1st April 2023 through infusion of Rs 9,000 crore in the corpus. This scheme would enable additional collateral-free guaranteed credit of Rs 2 lakh crore and reduce the cost of the credit by about 1 per cent. At the hindsight, the Union Budget strikes a fine balance between big capex and fiscal discipline; it will spur the growth of Indian economy, improve the infrastructure and empower the common people. Axis Communication

Sudhindra Holla

Director, Axis Communications, India & SAARC

“The Union Budget for this year focuses on inclusive economic growth in order to strengthen India’s status as a global digital powerhouse. We are optimistic about the government’s saptarishi, or seven pillars, with a renewed emphasis on green growth. We are delighted with the Centre’s focus on tourism and investment in transportation infrastructure projects as this indicates an increase in demand for safety and surveillance solutions. We are aligned to further action India’s vision to transform our cities into ‘sustainable cities of tomorrow’. This will serve as a stepping stone in revitalising Smart Cities planning and urban development. The budget 2023 has a future-ready outlook and compliments the nation’s unmatched growth for digital economy, innovation, and inclusive development.”

According to Parthesh Dhaggal, Founder, Enceplon., there cheers to The Union Budget 2023-24 presented by our Hon. Finance Minister Smt. Nirmala Sitharaman in our Parliament on February 1, 2023. First, it gives a lot of opportunities for various industries to grow and expand, second it provides enough room for saving and spending for the middle class which is the backbone of an economy and the third ‘Amrit Kaal’ takes care of all round development of the country unleashing its true potential. An outlay of Rs. 2.40 lakh crore for the Railways, 50 additional airports to improve regional connectivity, big push for defense, infra development, tourism, education, agriculture, housing, ease of doing business, emphasis on green growth with focus on green fuel and green energy are indeed laudable. The tax reliefs to the middle class, reliefs to MSMES, Startups and Agriculture are positive steps taken to stimulate our economy. The proposed three centers of excellence for Artificial Intelligence R&D in top educational institutions will help realize the noble vision of ‘Make AI in India, Make AI Work for India’ and boost AI related R&D in the areas of agriculture, health and sustainable cities. Further, increasing capital investment outlay by 33.4% to Rs. 10 lakh crore ,100 transport infrastructure projects for end-to-ed connectivity for ports, coal, steel, fertilizer sectors, creating Urban Infrastructure Development Fund for tier 2 and tier 3 cities will not only spur growth but also provide a lot of opportunities for many sectors and create thousands of jobs for our people.

Parthesh Dhaggal Founder, Enceplon

Certainly, it is a growth propelling progressive budget giving ample scope for all segments to fulfill their goals. It augurs well for the security industry in India, as a growing economy like India needs more security to safeguard its humongous assets, properties, infrastructure and vast population.

49 49

STOR AGE C

loud storage is a model of computer data storage in which the digital data is stored in logical pools, said to be on “the cloud”. The physical storage spans multiple servers (sometimes in multiple locations), and the physical provides manageable services such as hosting, security, management and maintainance of the servers and related infrastructure. The service provider ensures that you have access to the data when you need it. environment is typically owned and managed by a hosting company.

Cloud Storage is expedient to all business

50

MARCH 2022

These cloud storage providers are responsible for keeping the data available and accessible, and the physical environment secured, protected, and running. People and organizations buy or lease storage capacity from the providers to store user, organization, or application data. Cloud storage services may be accessed through a collocated cloud computing service, a web service applicationprogramming interface (API) or by applications that use the API, such as cloud desktop storage, a cloud storage gateway or Web-based content management systems.

www.asindia.in

Cloud work According to Ankush Tandon, Vice President (VP), Technology, Prama Hikvision India Pvt. Ltd., cloud storage enables to save video surveillance data and files to an offsite location such as datacenters that can be accessed via the public Internet or a dedicated private connection via SSL VPN or IPSec VPN. The data you upload off-site for storage is the responsibility of a third-party cloud service provider. The service provider provides manageable services such as hosting, security, management and maintainance of the servers and related infrastructure. The service provider ensures that you have access to the data when you need it. Cloud storage provides an economical and scalable alternative to file storage on hard disks Computer or Server hard disks are only able to store a limited amount of data. When users do not have any more storage, they should transfer files to an external storage device. Traditionally, organizations built and maintained storage area networks (SANs) to archive data and files. The Storage

Cloud storage enables to save video surveillance data and files to an offsite location that can be accessed via the public Internet or a dedicated private network connection. The data you upload off-site for storage is the responsibility of a third-party cloud service provider. The provider hosts, secures, manages and maintains the servers and related infrastructure and ensures that you have access to the data when you need it. Ankush Tandon Vice President (VP), Technology, Prama Hikvision India Pvt. Ltd.

Area Networks (SANs) are expensive to maintain, however, because as stored data grows, companies have to invest in adding servers and infrastructure to accommodate increased demand, also need to invest on various data security tools for DLP (Data Leakage Prevention), End Point security and legal hold respectively.

Cloud storage services provide elasticity, which means you can scale capacity as your data volumes increase or degrade the capacity if necessary. By storing data in a cloud, your organization save by paying for storage technology and capacity as a service, rather than investing in the capital costs of building and maintaining in-house storage

networks. You pay for only exactly the capacity you use. While your costs might increase over time to account for higher data volumes, you don’t have to overprovision storage networks in anticipation of increased data volume. Like on-premise storage networks, cloud storage uses servers to save data; however, the data is sent to

51

servers at an off-site location. Most of the servers you use are virtual machines hosted on a physical server. As your storage needs increase, the provider creates new virtual servers to meet demand. Typically, you connect to the storage cloud through either the internet or a dedicated private connection, using a web portal, website, or a mobile app. The server with which you connect forwards your data to a pool of servers located in one or more data centers, depending on the size of the cloud provider’s operation. As part of the service, providers typically store the same data on multiple machines for redundancy. This way, if a server is taken down for maintenance or suffers an outage, you can still access your data. India video surveillance storage market is expected to be positive owing to growing adoption of cloud based services, increasing usage of wireless devices, and need for continuous surveillance are complementing the growth of the NAS market in India. Increasing demand for IoT based IP Cameras across various verticals is fuelling the demand for NVRs for storage purposes. However owing to their lower ownership costs, DAS is the majorly preferred solution by small businesses instead of NAS/SAN. However, SAN is gaining popularity across data centres and large-scale enterprises owing to its high-speed access along with greater scalability, flexibility & reliability.

52

MARCH 2022

www.asindia.in

According to Parthesh Dhaggal, Founder, Enceplon., Cloud Storage works through remote servers to save data, such as files, business data, videos, charts, graphs, or images. When users upload data to servers via an internet connection, it is saved on a virtual machine on a physical server. Normally, a cloud storage architecture includes a master control server and several storage servers. To ensure the availability of this information widespread and provide redundancy, cloud providers will often spread data to multiple virtual machines in data centers located across the world. If storage needs increase, the cloud provider will spin up more virtual machines to handle the load. Users can access data in Cloud Storage through an internet connection and software such as web portal, browser, or mobile app via an application-programming interface (API). Types of cloud storage According to Ankush Tandon, cloud storage is available in three different types, which include private, public and hybrid clouds. • Public storage clouds: In this model, you connect over the internet to a storage cloud that’s maintained by a cloud provider and used by other companies. Providers typically make services accessible from just about any device, including smartphones and desktops and let you scale up and down as needed.

Cloud Storage works through remote servers to save data, such as files, business data, videos, charts, graphs, or images. When users upload data to servers via an internet connection, it is saved on a virtual machine on a physical server. Parthesh Dhaggal Founder, Enceplon

an on-premise private cloud or engage a cloud storage provider to build a dedicated private cloud that you can access with a private connection. Organizations that might prefer private cloud storage include banks or retail companies due to the private nature of the data they process and store. • Private cloud storage: Private cloud storage setups typically replicate the cloud model, but they reside within your network, leveraging a physical server to create instances of virtual servers to increase capacity. You can choose to take full control of

• Hybrid cloud storage: This model combines elements of private and public clouds, giving organizations a choice of which data to store in which cloud. For instance, highly regulated data subject to strict archiving and replication requirements is usually more suited to a private

cloud environment, whereas less sensitive data (Non-critical data, such as email that doesn’t contain business secrets) can be stored in the public cloud. Some organizations use hybrid clouds to supplement their internal storage networks with public cloud storage. According to Parthesh Dhaggal, There are four major types different cloud storage namely Private Cloud Storage, Public Cloud Storage, Hybrid Storage and Community Cloud Storage. Private Cloud Storage is exactly what the name says. This system is designed for one person or company that is specific to your needs. These

53

types of cloud storage come in two formats: onpremise and externally hosted. Both work well, but primarily for businesses, not individuals, unless you are running a smaller home-based company. You have more administrative control and can design the system to what you want it to accomplish in the way of business needs. Public Cloud Storage is a cloud service that requires little administrative controls and can be accessed online by any anyone you authorize. You get the same security, but don’t need to maintain the system as much as you would with a private cloud. You don’t need a rigid integration with your business needs or private storage concerns. Hybrid Cloud Storage Hybrid clouds offers a combination of private and public clouds. You can customize your features and insert the applications that meet your needs, as well as the resources that work for you. The most important data can be kept on a private cloud, while the less important data can be stored on a public cloud and accessed by a host of people remotely. You can store data in an efficient storage environment, which saves time and money. Community Clouds are distributed systems created by integrating the services of different clouds to address the specific needs of an industry, a community, or a business sector.

54

MARCH 2022

www.asindia.in

In community cloud, the infrastructure is shared between organization which have shared concerns or tasks. The cloud may be managed by an organization or a third party. Sectors that use community clouds are: Media, Healthcare, Education, Energy, Environment, Scientific Research. Pros and cons of cloud storage According to Ankush Tandon, as with any other cloud-based technology, cloud storage offers some distinct advantages. However, it also raises some concerns for companies, primarily over security and administrative control. Pros • Off-site management: Your cloud provider assumes responsibility for maintaining and protecting the stored data. This frees your staff from tasks associated with storage, such as procurement, installation, administration, and maintenance. As such, your staff can focus on other priorities. • Quick implementation: Using a cloud service accelerates the process of setting up and adding to your storage capabilities. With cloud storage, you can provision the service and start using it within hours or days, depending on how much capacity is involved.

• Scalability: Growth constraints are one of the most severe limitations of on-premise storage. With cloud storage, you can scale up as much as you need. Capacity is virtually unlimited. • Business continuity: Storing data offsite supports business continuity in the event that a natural disaster or Fire incidents due to electric short circuit, which cuts access to your premises. Cons • Security: Security concerns are common with cloud-based services. Cloud storage providers try to secure their infrastructure with up-to-date technologies and practices, but occasional breaches have occurred, creating discomfort with users. However, reputed Service Providers fix them in very minimal time interval.

• Cost-effective: As mentioned, you pay for the capacity you use. This allows your organization to treat cloud storage costs as an ongoing operating expense instead of a capital expense with the associated upfront investments and tax implications.

• Administrative control: Being able to view your data, access it, and move it at will is another common concern with cloud resources. Offloading maintenance and management to a third party offers advantages but also can limit your control over your data. Also, data migration in case of shift from one service provider to other is the very key challenge.

• Latency: Delays in data transmission to and from the cloud can occur because of traffic congestion, especially when you use shared public internet connections. However, companies can minimize latency by increasing connection bandwidth. • Regulatory compliance: Certain industries, such as healthcare and finance, have to comply with strict data privacy and archival regulations, which may prevent companies from using cloud storage types of files, such as medical and investment records. If you can, choose a cloud storage provider that supports compliance with any industry regulations impacting your business. According to Parthesh Dhaggal, there are many pros and cons while using cloud-based security . The pros include accessibility, vast and almost unlimited storage capacity, speed, timely automatic updates, considerable savings on cost ,time and space, flexibility, scalability, backup and recovery facilities , optimal efficiency and sustainability. The cons are privacy issues, malware infections, cyber-attacks, regulatory compliances, compatibility issues, insecure APIs, latency, outages, data ownership and liability concerns.

55

Quantum Announces Partnership with WaitTime for Real-Time Crowd Intelligence Using AI software and Video Surveillance Data By Quantum

Joint solution provides live crowd analysis and information for sports and entertainment venues, retail, transportation, convention centers, and more Quantum Corporation (NASDAQ: QMCO), the leader in solutions for video and unstructured data, today announced a partnership with WaitTime, the industry leader in crowd intelligence analytics, to deliver a certified solution that provides real-time crowd intelligence using video surveillance data captured and stored by Quantum’s Unified Surveillance Platform (USP). Quantum certified WaitTime AI software to run effectively on USP and offer easy deployment to organizations that want to maximize the value of their video surveillance data, like extracting crowd intelligence insights intended to deliver a better customer experience. Quantum’s Unified Surveillance Platform is a unified compute and storage platform that is highly resilient and designed to retain data even if hardware fails. It is capable of scaling to handle tens of thousands of cameras. USP has the added advantage of being able to manage and run multiple physical security applications on a single infrastructure, including analytics applications like WaitTime. The combined USP and WaitTime solution uses data produced by video surveillance cameras to analyze queues in venues such as stadiums, malls, airports, and more. WaitTime’s AI software provides real-time data and historical analytics on crowd behavior. Their patented

56

MARCH 2023

USP can manage and run multiple physical security applications on one single unified infrastructure, including analytics applications like WaitTime.

artificial intelligence gives operations personnel live information on crowd movement and density while providing guests with information they need to navigate a venue and get information on things like queue times at concession stands to ensure they have the best guest experience possible. End users can access this information direction from the venue’s general customer app. “Video surveillance data is increasingly being used for business operations and value in addition to security and loss prevention,” says Choon-Seng Tan, general manager, Video Surveillance, Quantum. “This certified solution with WaitTime AI software gives these facilities a way to provide a better guest experience, while Quantum enables them to simplify their recording and analytics infrastructure and reduce operational costs by consolidating multiple individual servers—like NVRs-- onto a single, unified compute and storage platform.” “WaitTime continues to evolve our AI solution every day with new features and increased accuracy. It’s critical that the infrastructure

www.asindia.in

supporting our application is resilient, high-performance, and scalable to ensure the best customer experience. Quantum’s USP software was built to manage multiple physical security applications simultaneously, including the requirements of an AI analytics app like WaitTime. This combined solution is designed to be easy to deploy and give organizations increased visibility within the operations of their venue while providing additional value to end users,” says Zack Klima, founder and CEO, WaitTime. Quantum and WaitTime are hosting a webinar discussing the joint solution on April 10th. Register here. To learn more about the combined solution, visit Quantum’s website or booth #31061 at ISC West. About WaitTime WaitTime, the industry leader in crowd intelligence provides realtime data and historical analytics on crowd behavior. Our patented artificial intelligence gives operations personnel live on crowd movement and density, while providing guest’s information they need to navigate.

Burglary threats clouding your mind? Secure your bank with solutions that provide assurance and peace of mind with Texecom Our sensors are dual tech antimasking. Therefore, in case of blackening or covering the sensor, they generate the alarm. The open protocol makes them highly integrable to CMS and ARC’s. The wired and wireless range come with extensive security features like event logging and signage control. Therefore, now any unauthorised entry is marked and reported immediately. Texecom has recently ventured into manufacturing the products in India to align to Make-in-India initiative. Our extensive experience in manufacturing and product development drives us to make products and solutions aligned to the Indian market. By Texecom

In November 2022, A group of masked men burgled a branch of the Karnataka Gramin Bank in Hosahalli on the outskirts of Bengaluru, and made away with 15 kilograms of gold valuables worth `3.5 crore and `14 lakh cash. This is one of many incidents that have happened lately. Bank branches and ATMs are in facing this underlying threat. The regulations require security systems to be installed, but how many of them can provide the assurance and quality? In the above incident, there was a burglar alarm installation at the site, but the gang blackened the cameras and disconnected the burglar alarms. The accused entered the building by cutting the window grills with a gas cutter. Can we reflect on the point of having a system that does not safeguard the ATM’s and can be tampered with so easily?

Security threat in financial institutions is not just about regulation anymore. Any such incident impacts brand value and customer morale. Texecom endto-end security solutions provide customizable answer to all the challenges. We promise to provide peace of mind and trusted protection through connected, intelligent, and dynamic solutions. What makes Texecom perfect for secure banking solutions:

Let’s look at how Texecom is a conducive solution to this problem. Our grade 2 and grade 3 products are expandable and tamper-proof. Grade 3 intrusion alarm systems defend a property from intruders with expert knowledge of the alarm system and specialist tools. In case of any disconnection or breakage, the system will raise different kinds of alarms as per the usage. From alerts to CMs stations, calls and SMS’s, your team will know the instant someone illegally enters the premises. Our Odyssey series sounders raise audio alarm that alerts the people around. In case of wire disconnections, the battery backup of the products keeps them running and removes the dependency of the products on electricity availability.

• Make-In-India

Texecom is a global leading intrusion security company for commercial, residential, and industrial clients. We provide custom-made design solutions that protect people and property around the world. Our award-winning products provide every aspect of internal and external security over 35 years. In India, Texecom works with over 2500 system installers across India and provides dedicated tech support with our regional service centres.

• Continuous connection even on electric failure

• Collaboration with up to 2500 system installers • Scalable products • Grade 2 and 3 security products • Anti-masking and tamper proof sensors – alert on tampering or disconnection • Event-logging

Get unmatched protection through Texecom Intrusion solutions for reliable security.

57

Hi-Tech Access Control System

By ZKTeco

58

MARCH 2023

www.asindia.in

59

Matrix Cosec ATOM RD100K Reader: Simplifying Access Control for Organizations Another feature that sets the COSEC ATOM RD100K apart from other access control devices is its thirdparty integration capability. With its Weigand interface, this device can integrate seamlessly with third-party systems, making it a flexible solution for businesses that seek to expand and update their existing infrastructure. This feature also enables businesses to customize their access control systems, ensuring that they meet their specific security requirements. It is designed to provide enhanced security features beyond standard access control measures. The device offers various features that provide high-security standards, including antipassback, first-in user, and man-trap.

By Matrix Comsec

A

ccess control readers play a crucial role in access control systems by reading usaer credentials and verifying whether they have the authorization to access a specific area. These readers can either be standalone devices mounted on walls or integrated into entrance turnstiles. As access control systems become more prevalent, it is essential for organizations to select the appropriate access control reader that meets their security requirements. The COSEC ATOM RD100K is an innovative access control reader that is part of the COSEC ATOM series manufactured by Matrix. This device boasts superior technology that caters to all access control needs that are in demand across the market. It is designed to provide a balance between utility and aesthetics, ensuring that it enhances the visual appeal of any corporate environment while providing enhanced security features. One of the most significant features of the COSEC ATOM RD100K is its ease of installation. With its minimalistic installation process, this device can easily be deployed without having an entanglement of wires. Additionally, its multi-credential and multi-interface capabilities make it an optimized reader that meets all workspace security requirements. It also boasts a sleek design that redefines workspace aesthetics. With its elegant and modern look, it is designed to complement any office environment. This feature makes it a perfect choice for businesses that seek to enhance the visual appeal of their workspace while maintaining highsecurity standards. The device offers several credentials, including mobile-based Bluetooth, PIN, and RFID cards, which enable a user-friendly experience for employees. The mobile-based Bluetooth feature allows employees to use their smartphones as access control credentials, which is a convenient and secure way to access the workspace. This feature also eliminates the need for employees to carry additional cards, ensuring that they have a hassle-free and streamlined experience when entering and exiting the workspace.

60

MARCH 2023

www.asindia.in

Some of the Key Features: • Multi-Credential Support - PIN, RFID Card & Mobile authentication • Multiple Interfaces - Wiegand, RS-232, Exit Switch Interface, Door Lock Relay • Certified protection against Ingress and Vandal • Third-party Integration In conclusion, the COSEC ATOM RD100K is an innovative access control reader that offers a comprehensive range of features to meet all workspace security requirements. Its ease of installation, elegant design, and thirdparty integration capabilities make it a flexible solution for businesses seeking to optimize their access control systems. Its multi-credential and multi-interface capabilities provide a user-friendly experience for employees, while its enhanced security features beyond standard access control measures ensure that businesses can maintain high-security standards in the workspace. The device is suitable for businesses of all sizes and sectors, making it an ideal choice for organizations seeking to enhance their overall security.

Johnson Controls releases web-based event management tool C•CURE IQ Security Client By Johnson Controls

J

ohnson Controls, the global leader for smart, healthy and sustainable buildings announced today that it has released C•CURE IQ Security Client, a security operations solution encompassing a feature set designed for both access control and video surveillance to create a complete streamlined enterprise security system. “The global security market is undergoing significant transformations led by customer needs for modernization and optimization of their security hardware and software,” said Sanjeev Singh, vice president of Product Management, Johnson Controls. “As part of this evolution, we are excited to release C•CURE IQ, the natural extension of C•CURE 9000, as a webbased offering which now includes video surveillance capability. Its web-based security client is critical for the growing needs for anytime, anywhere access to enterprise security operations.” C•CURE IQ Security Client boasts an extensive feature set designed to create a complete streamlined endto-end solution from software and controllers to recorders and cameras. C•CURE IQ is the evolution of C•CURE 9000, leveraging its powerful access control features to meet today’s challenging compliance needs and supported by Johnson Controls’ renowned iSTAR Controllers, known for their reliability and cyber security. C•CURE IQ Security Client is designed for the web to simplify installations, offering flexibility in deployments and personalization of the overall user experience. With this approach, users can take advantage of several benefits, such as: • Minimized training required with a streamlined and intuitive icondriven user interface down to a tablet, where operators only see what they need.

C•CURE IQ Security Client combines enterprise access control and video surveillance together in a single, intuitive interface.

• Pre-configured or custom user interface (UI) layouts, tailored specifically to staff roles and responsibilities. • Enhanced authentication options are available leveraging an external OAuth2 compliant identity provider for single sign-on (SSO) or two-factor authentication (2FA), negating the need to remember additional usernames and passwords. • Flexible deployment options for cloud, on-premises or hybrid. C•CURE IQ Security Client also offers natural video surveillance and intuitive camera control with no extra integration licensing. • High-quality native video support with 4K live streaming and playback for proactive response, optimized for our enterprise VideoEdge network video recorders.

• Advanced object-based video search capabilities to quickly search and find video when you need it, powered by Johnson Controls’ Illustra AI technology. • Enhanced badge verifications with live and recorded video of door activity for visual verification from afar. “C•CURE IQ v3.00.1 is the future of enterprise security operation centers and signifies the most robust and feature-rich web offering that can help customers transition from silo systems to a unified security software platform,” said Singh. “Its powerful web UI supports security operation personnel’s everyday device interactions as well as our latest security innovations for a holistic security operation.” (Eventually link to video posted on SWH website) C•CURE IQ Security Client is now available for authorized Johnson Controls integrators and dealers.

61

Security a major concern as India’s banking sector expands

T

he Indian banking industry is going through several changes at present. The government recently merged some of them that remained independent for decades. Often there are concerns of operations at some bank or the other. We may see more privatization, increased use of digital technology, and concepts like neo banks. These changes and the increasing number of branches and ATMs raise several security concerns. Banks and financial institutions are constantly under threat of robbery that could cause financial loss, lives, and reputation. The current situation According to the Reserve Bank of India (RBI) report, 230,000 ATMs are deployed across the country. Of these, 46 percent are deployed offsite, where the vulnerability of security breaches is very high. Compared to the world average of 50 ATMs per 100,000 people, India only has 28 ATMs per 100,000, lower than several other nations. The introduction of several digital payment systems has helped reduce the reliance on ATMs to some extent, but they continue to remain a popular facility across the country. “Though there is a significant increase on various methods of digital payments, ATMs remain a critical banking channel, and cash remains a preferred payment type,” explains Prakash Narayan Shukla, Head of Operations at Hemabh Solutions. “This increases the risks associated with security both on the physical and digital side. According to RBI, about 53 Crore transactions occur through ATMs and 52 Crore through POS in a month. The number of frauds during FY21 in private banks have risen by 21 percent.”

62

MARCH 2022

In 2018 the central bank noted that India’s banks lost Rs 235.96 crore in the last five years to burglary, robbery, and theft. That was a 70 percent increase. The National Crime Records Bureau also reported 2271 incidents in Banks and 3692 in ATMs in 2019. What banks need to consider As banks continue to expand their footprint while pushing the digital drive further, security concerns on digital transactions and surveillance of ATMs/ branches at sites will be challenging for banks. While siphoning money directly from banks through cyber-attacks requires highly skilled hackers, phishing attacks, skimming/cloning/stealing of payment cards/ net banking identities/information could be done by criminals with less technical knowledge. “Enabling strong security at ATMs which are more prone will need efficient surveillance system and deterrent practices,” Shukla pointed out. “Also, as

www.asindia.in

observed globally, the number of incidents, including robbery and identify fraud, have spiked during the pandemic. As the saying goes, prevention is better than cure. We need to have a “Prevention First” mechanism in mind while building up the security system which acts as deterrence.”

The AI can also detect jaywalking, loitering, and suspicious behaviors outside of ATMs and bank buildings. They can alert security operators if any anomaly is detected.

In simpler terms, there should be a prevention-based strategy

“For example, it can alert if someone is seen more than three times in a day, and this is important because that person might be doing a recce of the site to plan theft,” Shukla continued. “AI-powered surveillance also can detect person carrying objects such as an iron rod or gun. These tools can help the monitoring teams to remain more alert and proactive. Numerous such parameters are available, which can help proactively stop a crime that’s yet to happen through an AIbased surveillance system.” There are also solutions integrated with AI-based surveillance systems that can lock the doors automatically if there is a security breach. They may also be able to spray cash with ink that would make them unusable. Challenges to overcome when protecting banks To best defend themselves from intrusion and fraud, banks must ensure they have a multi-layered security plan in place that includes leveraging the latest technologies to deter crime. This is the biggest challenge as banks are slow to accept new technology.

that goes beyond reliance on detecting security incidents. A robust surveillance system with the power of Artificial Intelligence-enabled cameras should become a part of any ATM infrastructure. Prevention and the role of AI The adoption of AI in surveillance will be a game-changer in security as it can enable a proactive prevention process to deter crime. This will also enhance the customer experience efforts of the bank. “For example, facial recognition at the entrance of ATMs can alert the staff if anyone listed as a criminal in databases of banks and law enforcement agencies,” Shukla pointed out. “These systems can also inform the staff when any premium customer enters, and the management wants to offer personalized services.”

“It appears that adoption of new technologies lags behind the technological advancement with innovation taking place rapidly,” Shukla added. “We all know that the criminals get better at what they do with time. They keep checking and analyzing the security system and learn ways to compromise it. Unless banks stay one step ahead of the criminals, the risk is always high.” Other challenges include those related to connectivity. For offsite ATMs, the telecom ecosystem needs to be robust for a consistent and stable network. At present, network connectivity, especially in far-off places, remains weak and creates a challenge in remote monitoring.

63

Sovereign Safe Controls Access to their Safety Deposit Vault through Efficient Matrix Security Solutions Range of configurability of the Matrix COSEC CENTRA software allows us to accomplish quite sophisticated logic at our high-security vault. Which we have found other software unable to match. Sam Patel

Managing Director

peace of mind by delivering the highest-level of security and access permission through various levels of security check (e.g. Card and Biometric Palm Vein Reader).

By Matrix Comsec

Industry: BFSI Customer Name: Location: Ilford, East London, UK

Solution:

Devices: 10+ Users: 1000+ Company Profile: Sovereign Safe provides deposit facilities that truly push the global standards of the safe deposit industry. With the very latest modular high compression steel vaults constructed and installed by specialist manufacturers, state-of-theart biometric access with complete audit trail from electronic alarmed lockers, Sovereign stands unrivalled as a leader amongst any high security facility anywhere in the world. No high street bank nor any safe deposit centre can match their credentials and the extraordinary security levels they have achieved. Challenges: People across the country have been targeted for their valuables, not only on the streets but also in their homes. Challenges were to offer a complete

64

MARCH 2023

Matrix solved these challenges by providing COSEC PANEL LITE, VEGA, PVR, PATH Series, and ARC DC100P. Matrix Access Control solution helps boost security along with barriers and door controllers. Offered solution is designed to address security concerns in a professional and systematic method without compromising hospitality and productivity. It allows enrolling visitor’s Fingerprint/Palm Vein Reader/RFID Card to provide the visitor with access to restricted area as per below criteria: • 2-Person rule: This is enforced by requiring the presence of at least two authorized persons • Route based access: This allows user to access the authorised route only • Anti-pass back: This restricts to enter a secured area second time without first leaving it

www.asindia.in

Results: • • • • •

Peace of mind Seamless experience Increase productivity of staff Quick actions on exceptions Multi-layer authentication

• Boost customer satisfaction Products Offered: • COSEC VEGA CAX integrated with turnstile • COSEC PVR DOOR CONTROLLER • COSEC PANEL LITE • COSEC PATH Series • COSEC ARC DC100P

Matrix Comsec felicitated with ELCINA DEFENNOVATION Award 2022 for Excellence in Manufacturing

D. Sunil - Zonal Sales Manager, Matrix Comsec (L) and Shashidhar Ms - Sr. Sales Manager, Matrix Comsec (R) Receiving the ELCINA DEFENNOVATION Award 2022 By Matrix Comsec

Matrix, a leading manufacturer of security and telecom products, was conferred with the prestigious ELCINA DEFENNOVATION Award 2022 for Excellence in Manufacturing at the glittering Award Ceremony held in Bangalore on 7th July 2022. The award highlights Matrix’s commitment to R&D and its track record of launching innovative and cutting-edge technology products in the Defence and Strategic electronics domain. Commenting on the achievement, Ganesh Jivani, Chief Executive

of Matrix said, “We are happy to win the prestigious ELCINA DEFENNOVATION Award for Excellence in Manufacturing. We thank the award committee comprising senior industry and defence experts for recognizing Matrix for its research, innovation, design and manufacturing capabilities. Matrix offers cuttingedge physical Security and telecom solutions in more than 50 countries including many firstworld technologically advanced nations. With 250+ R&D engineers and world-class processes and infrastructure, Matrix is committed to designing high-performance

solutions. This accreditation is a validation of our innovation and design capabilities that will go a long way in motivating us towards building world-class solutions.” Established in 1967, Electronic Industries Association of India (ELCINA) is the oldest and the largest association in the electronicsmanufacturing sector. Every year, through the DEFENNOVATION awards, ELCINA aims to recognize the outstanding companies which have made exemplary contributions in the field of Defence Electronics (R&D, Design and Manufacturing) demonstrating an innovative approach and excellence.

65

ZKTeco India Business Meet at Guwahati, 2023

By ZKTeco India

66

MARCH 2023

ZKTeco India is expanding its footprint rapidly across the nation including the Northeast parts of the country. As a testimony to this, it has conducted an event on 21st February, 2023 in Guwahati while emphasising on various technological and industrial trends and their impact on urban progressiveness as Guwahati being the largest metropolis in north-eastern India and amongst the top twenty cities to be selected under the smart cities mission.

www.asindia.in

One of the major objectives of the mission is establishing a safe and sustainable urban ecosystem. With numerous advances in Smart Security Systems alongside strong authentication and identity management solutions, achieving this goal is right around the corner. Leveraging end-toend security while lining up with the growing city needs can create a secure eco-system for the citizens, public infrastructure, and various entities of urban structure.

Thus, the event served as a right forum addressing these aspects to the audience through innovative solutions such as ZKBio CVSecurity and Armatura One focusing on a holistic approach for various security threats with intelligent analytical capabilities for effective early warning and prompt response to cope up with the unexpected challenges and variety of scenarios especially in a city environment with ever-evolving threat landscape. Finally, the event was concluded with the imperativeness of both physical security and cybersecurity and their essential part in the vision of futuristic society that awaits us.

67

ADVERTISER INDEX MARCH 2023, ISSUE - 145

*The index is provided as an additional service. *The publisher does not assume any liability for errors or omissions.

Company Name

Location

ASSA ABLOY

Page 07 India

HID

Page 03 India

iVIS

Page 09 India

Prama Hikvision India Pvt. Ltd.

Page 03 India

Prama India Pvt. Ltd.

Back Cover India

Tyco

Inside Front Cover India

Tyco

Page 01 India

ZKTeco

Front Index Page India

68

MARCH 2023

www.asindia.in

Country

69

Get in touch

Social

© Copyright 2013 - 2024 MYDOKUMENT.COM - All rights reserved.