Top Banner
C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx Newsletter: June 2014 Let’s professionalize the professionals… http://sbtyagi.wix.com/icissm The Third Annual BASIS - 2014 “Building a Secured India Summit” was held at Crowne Plaza, on May 23rd 2014, Gurgaon. BASIS 2014 is a leading annual conference on Industrial Security & exclusively showcases security solutions and is the main national discussion forum for the companies in the sector. At BASIS – 2014 industry experts shared new insights and solutions to emerging security threats in land, sea and air covering topics such as terrorism, security in mega scale projects and cyber security. The security conference gathered some of the brightest minds from the security community. I was one of the panelists on the discussion on topic "Evaluating a CSO with technology transformation" Along with Gen Vinay Bhatnagar and Brig GS Sisodia, VSM for which Ms. Aman Singh, Associate Editor of Security Today, was the moderator. During the seminar, I also made the presentation on the subject of “How to Maximize Security with Existing Infrastructure”. The detailed article is given below. S B Tyagi For ICISS Summer is in full swing and so are air conditioners in many households. In the process of cooling the air, water vapor in the air gets condensed on the cooling coils, which is routed out of the air conditioner through an outlet spout. Do you know how much water is thus produced by an air conditioner? Well, a 1 Ton AC produces about 1 liter of water in 1 hour. That's plenty! In most cases, this condensed water is just wasted out; either forming puddles on the roads or pavements down below, or ruining someone's car parked below the AC. Won't it be worthwhile to collect this water in a container, for thirsty birds? After all, you see plenty of birds with parched throats and open beaks, flying around in desperate search of precious water in summers, don't you? So go for it. The container must be sufficiently large to hold the water produced by your AC. And the container should be something like a shallow tray rather than a bucket (larger area and lesser depth) that would be convenient for birds to drink with ease.
13
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 14 june

C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx

Newsletter: June 2014

Let’s professionalize the professionals… http://sbtyagi.wix.com/icissm

The Third Annual BASIS - 2014 “Building a Secured India Summit” was held at Crowne Plaza, on May 23rd 2014, Gurgaon. BASIS 2014 is a leading annual conference on Industrial Security & exclusively showcases security solutions and is the main national discussion forum for the companies in the sector.

At BASIS – 2014 industry experts shared new insights and solutions to emerging security threats in land, sea and air covering topics such as terrorism, security in mega scale projects and cyber security. The security conference gathered some of the brightest minds from the security community. I was one of the panelists on the discussion on topic "Evaluating a CSO with technology transformation" Along with Gen Vinay Bhatnagar and Brig GS Sisodia, VSM for which Ms. Aman Singh, Associate Editor of Security Today, was the moderator. During the seminar, I also made the presentation on the subject of “How to Maximize Security with Existing Infrastructure”. The detailed article is given below.

S B Tyagi For ICISS

Summer is in full swing and so are air conditioners in many households. In the process of cooling the air, water vapor in the air gets condensed on the cooling coils, which is routed out of the air conditioner through an outlet spout. Do you know how much water is thus produced by an air conditioner? Well, a 1 Ton AC produces about 1 liter of water in 1 hour. That's plenty! In most cases, this condensed water is just wasted out; either forming puddles on the roads or pavements down below, or ruining someone's car parked below the AC. Won't it be worthwhile to collect this water in a container, for thirsty birds? After all, you see plenty of birds with parched throats and open beaks, flying around in desperate search of precious water in summers, don't you? So go for it. The container must be sufficiently large to

hold the water produced by your AC. And the container should be something like a shallow tray rather than a bucket (larger area and lesser depth) that would be convenient for birds to drink with ease.

Page 2: 14 june

C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx

Page 3: 14 june

C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx

Page 4: 14 june

C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx

The environment, in which the Security operates, has changed beyond recognition. The ease of travel, more open borders and digital technologies have globalized criminality, making it far harder to contain and prosecute. Terrorism, of course, is notoriously borderless. But globalization has also massively expanded opportunities for organized crime. And technology, by spawning new kinds of crime while facilitating the traditional variety, is helping

lawbreakers become ever bolder and more difficult to track down. The shelf-life of security technology and the functional life of security systems have been severely challenged by fast paced innovations and newer technology. Today’s technology is on the verge of obsolescence and yesterday’s technology is obsolete already! The investment on security systems and measures are directly linked to ROI and the operational life of the security systems.

Page 5: 14 june

C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx

One of the biggest challenges enterprise and public sector organizations face is in leveraging existing infrastructure like video surveillance to deliver more value, better situational awareness, and faster threat recognition and response. We need to gain a better understanding of today’s challenges and best practices in video surveillance and physical security, and how they can maximize existing security assets while minimizing risk. We also need to learn how the combination of PSIM, behaviour recognition technology and video surveillance can improve existing security infrastructure as well as gain insight on how data can be analysed for dramatic improvements in situational awareness, response and resolution. To maximise the security with existing infrastructure, following are the essential ingredients -

Thinking out-of-the-box! Innovation and application Know your inventory Know your technology PSIM Predict and improve through analytics Data storage – cloud computing Trust the team Optimize ways of working Enhance collaboration Proactively manage changes

It is a category of software that provides a platform and applications created by middleware developers, designed to integrate multiple unconnected security applications and devices and control them through one comprehensive user interface. It collects and correlates events from existing disparate security devices and information systems (video, access control, sensors, analytics, networks, building systems, etc.) to empower personnel to identify and proactively resolve situations. PSIM integration enables numerous organisational benefits, including increased control, improved situation awareness and management reporting. Ultimately, these solutions allow organisations to reduce costs through improved efficiency and to improve security through increased intelligence. A complete PSIM software system has six key capabilities:

Collection: Device management independent software collects data from any number of disparate security devices or systems.

Analysis: The system analyses and correlates the data, events, and alarms, to identify the real situations and their priority.

Verification: PSIM software presents the relevant situation information in a quick and easily-digestible format for an operator to verify the situation.

Page 6: 14 june

C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx

Resolution: The system provides Standard Operating Procedures (SOPs), step-by-step instructions based on best practices and an organization’s policies, and tools to resolve the situation.

Reporting: The PSIM software tracks all the information and steps for compliance reporting, training and potentially, in-depth investigative analysis.

Audit trail: The PSIM also monitors how each operator interacts with the system, tracks any manual changes to security systems and calculates reaction times for each event.

A key differential between PSIM based integration and other forms of physical security system integration is the ability for a PSIM platform to connect systems at a data level, contrasting other forms of integration which interface a limited number of products. PSIM allows use of open technologies which are compatible with a large number of manufacturers. These PSIM products offer more opportunities for expansion and can reduce implementation costs through greater use of existing equipment. PSIM solutions in general are deployed to centralize information to single or multiple control hubs. These are referred to as control rooms or command and control centres. Security systems typically integrated into a PSIM solution include;

Access control systems CCTV Fire detection Video wall Intrusion detection system Perimeter Intrusion detection system Radar based detection GIS mapping systems Intercom Automated barriers & bollards Building management systems Lighting control system Power Monitoring System

Apr 2014 - New analysis from Frost & Sullivan, Global Physical Security Information Management Market Assessment, finds that the market earned revenues of $195.7 million in 2013 and estimates this to rocket up to $835.6 million in 2022. The study covers the application segments of mass transport, commercial, safe cities and first responders, government, oil and gas, utilities, and border and maritime. Safe cities and first responders, mass transport, and commercial are currently the key revenue-generating segments. Jan 2014 - According to a new market report published by Transparency Market Research "Physical Security (Hardware, Software and Services) Market - Global Industry Analysis, Size, Share, Growth, Trends and Forecast, 2013 - 2019," the global physical security market is expected to reach a value of USD 125.03 billion by 2019, growing at a Compound Annual Growth Rate (CAGR) of 14.9% from 2013 to 2019.

Page 7: 14 june

C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx

Dec 2012 - According to the Frost & Sullivan Analysis Worldwide Physical Security Information Management Market Report the worldwide physical security information management (PSIM) market is expected to grow from $80.0 million in 2009 to $544.0 million in 2015, with a Compound Annual Growth Rate (CAGR) of 37.6%. There is a mix of companies which are either very strong in “pure” PSIM solutions and others that are adding functionalities to a basic video management system (VMS).

It is Behavioural Analytics technology that analyses video content by imitating learning and memory processes of the human brain. This fully automated scalable surveillance technology is different from all Video Analytics systems since it is able to autonomously detect abnormal behaviour in real time, without the need of human intervention. The computer software utilizes the behavioural Analytics technology, which monitors a scene through each camera separately and learns on behaviour. This system combines computer vision with cognitive machine learning processes, and it develops patterns for different classes of objects. These patterns later become rules for the system that autonomously detaches normal situations from those that can be possible threats.

Reason-based system: Unlike the traditional, rule-based system, Behavioral

Analytics is the reason-based system that enables a machine to learn what is abnormal, without human pre-programing. By decreasing the number of alerts, it helps security officers to perceive more threats in real time.

The Entire Field of View Analysis: BRS analyses the total field of view through each video camera in closed-circuit television system, despite certain difficulties, types of equipment or specific conditions on a scene.

Continuous Learning and Modifying: Unlike the traditional video surveillance rules-based technology, BRS permanently learns and registers when some changes occur, so any on-going programing is not necessary.

Open Standards: It is the "open standards" system which enables it to cooperate easily with different infrastructures, both the existing ones and the new ones. This video surveillance technology has been deployed globally across critical infrastructure facilities, intelligence agency applications, urban areas, seaports, financial institutions and others.

Easy Installation: BRS needs maximum of a few days for the complete hardware and software installation, regardless of the number of cameras that need to be connected into the system and without any changes on the client's site.

In all probability, the CCTV system needs largest storage space. The need increases with advent of HD cameras. A typical CCTV System with 140 cameras of fixed focal and 10 DH cameras, the storage needed for 30 days recording with reduced frame rate is 20 TB approximately. With the number of HD cameras and the types of video analytics increase, the storage space goes for quantum leap! In such scenario the cloud computing is better alternative.

Page 8: 14 june

C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx

With Cloud Computing becoming more widely utilized, it is important for organizations to understand ways to maximize benefits and minimize risks of a move to the cloud. Buyers need to appreciate that assessing individual providers is critical to the success of Cloud Computing programs.

Five tips when deploying or upgrading video signal transmission products By: Frank “Skip” Haight

Creating a successful video surveillance system has become very different than it was 10 years ago. Taking a backseat in the process is the traditional point-to-point analog surveillance system consisting of analog cameras transmitting over coaxial cable (coax), UTP or optical fibre. Traditional analog systems are very much in play and are still being specified and used very successfully; however, network or IP video is gaining significantly every year. Whether you are planning an analog video CCTV or IP video network, here are some tips to consider when planning your video transmission system. 1. Choose the system that best meets your needs, whether it is analog or IP video.

Although IP is now on the leading edge, analog systems still work well, are cost-effective and easy to install. If you are recommending an analog system, what distances are you facing? For extended distances, fibre optic is a better choice. Instead of being limited to the accepted 750 -1000 feet distances that coax cable supports, fibre offers distances in kilometres and miles for multi-mode fibre; and larger numbers of miles and kilometres using single-mode fibre optic cables. Media cost is very close, but optical fibre gives you the option of transmitting up to 32 channels of uncompressed full-motion, full-colour, real-time video and eight channels of camera control data simultaneously on a single strand of single-mode optical fibre, at distances up to 35 miles. Most CCTV projects are a fraction of that distance, but it gives you a perspective on the bandwidth available. Fibber optic, video transmission allows for RS-232, RS-422 and RS-485 or "up-the-coax" camera control data and audio to be transmitted along with the video. It also gives you options regarding video quality and can easily transmit RS-250C Short-Haul quality; 10-bit digitally encoded video with no latency over these distances.

Frank "Skip" Haight has been leading the marketing effort for high-profile communication product manufacturing companies for the past 14 years. Currently he is Vice President of Marketing for ComNet Communication Networks in Danbury, Conn. USA. He can be contacted at – [email protected]

Page 9: 14 june

C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx

When you factor in the cost of fibre optic transmission vs. traditional coax or even UTP, it becomes an easy choice. Fibber Optic networks also give you many options in terms of system topology, in addition to point-to-point and star topologies, fibre optic networks can be designed as add, drop and repeat; and as closed-ring, redundant networks.

2. IP or Ethernet-based video transmission networks are becoming a greater focus as a solution to today's video transmission challenges.

The move to IP video networks using IP cameras and network products has produced a significant technology shift. Technology continues to evolve and ever-improving advancements such as megapixel and cloud topologies have surfaced, and this has helped secure the demand for IP systems. The advantages that a complete, networked solution gives you are significant. Ethernet is standards-based, so in theory, if you interconnect different manufacturers' components, and transmit all types on signals over the same network - video, intercom, access control, data and more - everything should operate seamlessly. The flexibility in how you connect these edge and network components is also very attractive. Scalability is also very important and you can easily add on additional edge components at a much less expensive rate much more easily. The network itself has incredible intelligence for self-monitoring, redundancy and optimization. You now also have lots of intelligence pushed out to the edge of the network, enabling capabilities like analytics and systems monitoring that far exceed older abilities. 3. Encode, rip-and-replace or retrofit?

Once the decision has been made to move to an IP CCTV Network, you are faced with a few options regarding video transmission. If the move is in a current facility with an existing analog CCTV System, you must:

• Encode the existing analog video; • Start over completely; or • Retrofit existing equipment and media.

Encoding entails keeping the existing analog CCTV cameras and their corresponding media - be it coax, UTP or Fibber Optic and, using a video encoder/decoder; converting the video to Ethernet and inserting it onto the network through a network switch. The IP video is then directed to a network video recorder for monitoring and storage. Encoding is most likely the least expensive way to move to IP video. The encoding/decoding can be done at the remote. location using video encoders or at the head-end, where the video can be transported over existing media and encoded before being inserted on to the network encoding at the remote location can be made with any of hundreds of video encoders available today.

Page 10: 14 june

C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx

If the remote location is unconditioned, then a hardened encoder must be selected, and they are a little more difficult to find. The downside to encoding analog video is a limitation in. video quality. As good as most analog cameras are, they are no match for today's megapixel or high definition cameras. Complete start over. A complete start Over is likely the most costly, but is really the only way to truly future-proof your CCTV network. So, what do you need to be thinking about with respect to designing a network? First, are you dropping cameras onto an existing network that you are using for normal company operations? That might not be the best planning, as IP video requires a lot of bandwidth. Disrupting or slowing down a company's existing operational network might not be a prudent decision. Starting a new Ethernet network for security might be the safer bet in the king run. When planning an IP Security network, for each location, you need to understand a current need for the number of devices, plus what you expect to need for expansion (vs. cost). You must also be able to determine and plan. Questions that will come up are:

How much bandwidths will your devices need, across each segment and aggregated?

By using wireless Ethernet transmission, you can avoid the logistical nightmare of running copper or fibre optic cables back to a central monitoring or command and control centre.

• What distances do you need to cover? The answer to this question determines what type of media you will need to select. For systems that use megapixel or HD IP cameras with distance considerations, single-mode fibre optic equipment is a safe choke.

• Are you using a Managed Ethernet Switch? A managed switch enables a user to control the IP address and features of the switch, giving the ability to precisely optimize and control traffic on the network; thus allowing the media to be used more efficiently. Using managed switches helps the chosen media – copper, fibre or wireless – to use the available bandwidth more efficiently.

Retrofit. Can I re-use existing cabling? If a fibre optic CCTV network is/was in place, chances are the fibre can be re-used with simple fibre optic media converters or switches with optical ports. If the existing CCTV surveillance network is/was in place and the move to Ethernet is being made, IP video can be transported over the existing coax or UTP. Manufacturers can offer products that can extend distances over existing coax or UTP and support PoE, enabling the transmission of 100Mbps of Ethernet data to distances of approximately 600 meters without PoE or approximately 200-300 meters depending on IP camera power consumption with Class 3 13 watt PoE.

Page 11: 14 june

C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx

There are variations to account for when using higher power, but these distances are good general recommendations. All are greater than the 100-meter generally accepted maximum distance for fast Ethernet. 4. Is wireless the right Choice?

Wireless Ethernet transmission holds great potential, as it does not bind you to the logistics of running copper or fibre optic cables. It sounds simple, but there are many parameters that

must be factored in to get a favourable installation. Network topology, obstacles, weather and time of year all have to be considered.

But many wireless Ethernet product lines promise installation that is basically power, point and play - meaning you power up the access point and the field deployed client, point/aim the units using the antenna alignment tool and start transmitting Ethernet. Taking the complexity out of using wireless is a major advantage to acceptance and use. It is still not for every application, but it has its place.

5. Will the system operate seamlessly?

The promise of Ethernet and the entire 1EE802.3 set of standards are to ensure that all IP devices that meet that standard theoretically operate seamlessly over the network. The reality of that promise is that

many times, IP devices from different manufacturers do not seamlessly operate.

The safe bet for IP video transmission is to choose the transmission products from one manufacturer. If you can find a single source for your Ethernet transmission equipment, be it wireless Ethernet, Fibber Optic Ethernet, Ethernet over copper, Ethernet switches, media converters, having it all operate seamlessly is more likely to occur.

In many cases, working closely with the product manufacturer and supplying them or working with them on the system design will allow configuration testing to happen before the installation. Working closely with the manufacturer allows interoperability issues to be solved in the lab and not in the field.

Page 12: 14 june

C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx

David Chazan, Thursday, May 8, 2014/National post Paris - Chinese police will be patrolling the streets of Paris this summer alongside their French counterparts to help combat a surge in attacks against high-spending Chinese tourists. The French authorities are determined to improve security for more than a million Chinese tourists who visit the capital for shopping and sightseeing each year. Their habit of carrying large amounts of cash has made them a “prime target for muggers and pickpockets”, a police source said. Chinese visitors to Paris are estimated to spend an average of euros 1,470 ($2,230 CDN) each on shopping, mainly buying designer brands, according to Global Blue, the Swiss-based duty free services company. An interior ministry official said the number of Chinese police to be deployed in Paris was still being decided. “Their role will be preventative and they will carry out patrols with French police at tourist sites,” the official said. In an incident that caused alarm in Beijing and received wide media coverage, a group of 23 Chinese visitors were robbed of cash and passports last year as they left a restaurant only a few hours after landing at Charles de Gaulle airport. “ That was the tipping point,” said Tang Lu, the manager of the travel agency Chine Tourisme. “There had always been pickpockets, but last year physical attacks started happening along with the thefts.” The thieves are usually on motorbikes. They ride up on to the pavement and grab the tourists’ bags. The Chinese are the biggest buyers of duty free goods in Paris. The department stores Galeries Lafayette and Printemps employ hundreds of bilingual staff to help Chinese customers find their way around, but say they are powerless to protect them as they leave the stores. “We’ve witnessed a lot of muggings,” said a Chinese saleswoman at a luxury goods store. “The thieves are usually on motorbikes. They ride up on to the pavement and grab the tourists’ bags.” More Chinese tourists are expected this summer because of a series of events marking the 50th anniversary of the establishment of diplomatic relations between France and Communist China. In an indication of the importance Paris attaches to encouraging Chinese visitors, Laurent Fabius, the foreign minister, personally welcomed tourists arriving on a flight from Beijing last week.

Page 13: 14 june

C:\Users\sbtyagi\Documents\ICISS\News Letter June 14.docx

Upcoming Events:

ICISSM is happy to be event partner with “Secutech India Safety & Security Conclave 2014” which is all set to revolutionize the way safety and security industry conducts business in India. Secutech India 2014 on 6th & 7th March 14 at Mumbai was a grand success with an impressive exhibitor and visitor statistics, which left a perceptible impression. The theme of “Secutech India Safety & Security Conclave 2014” Delhi is “Securing Future of India”. Date & Time: 26th June 2014 Venue: Hall No- 11; Pragati Maidan, Delhi, India. Contact Person: Susmita Das Chowdhury, Conference Manager HP: +917738219912 W:+91-22-6681 4900 . Extn: 371 F:+91-22- 26367676 E-mail: [email protected]

ICISS at LinkedIn: http://www.linkedin.com/groups?gid=4413505&trk=hb_side_g ICISS at Google Group: https://groups.google.com/forum/?fromgroups#!forum/icissm

Suggestions & feedback may be sent to us on e-mail: [email protected]

P.S. - If you don't like to receive our newsletter, we apologize for bothering you. Please let us know your mail address and we will move it out from our contact list, thank you!