i-PRO Co., Ltd. Celebrates Key Milestones And Achievements | Security News – SecurityInformed

Dahua DHI-LPH65/75/86-MT440-C 65/75/86'' UHD Smart Interactive Whiteboard
Pelco Sarix® Multi Pro Camera series
Anviz C2 Series Biometric Identification And RFID Card Access Control & Time Attendance Devices
Vanderbilt Feenics Cloud-Based Enterprise Access Control Platform
Milestone Provides Video Management Software Solution To Enhance Security For Utah Transit Authority (UTA)
Chukchansi Gold Casino And Resort Meets Regulations And Secures Guests And Staff
Optex Shares The Benefits Of Implementing LiDAR Security For The Entertainment Industry
Anviz Provides FaceDeep 5 And Crosschex Personnel Identity Verification To Enhance Security For Dürr
Anatomy of a False Alarm
Making Physical Security a Critical Pillar of your Cybersecurity Strategy
Preventing Fan Violence: 7 Tips for Moving from Reactive to Proactive Security
Improving Real-time Visualization And Collaboration In SCADA Operations
Public-Private Partnerships On Campus: What You Need To Know
A More Secure Alternative to 125 kHz Proximity Cards
5 Ways To Strengthen Physical Security With An Integrated System
The Critical Role of Access Control in K-12 School Security
4 Oct 2022
Recognizing the company’s rapid rate of innovation and growth since it became independent from Panasonic in 2019, i-PRO Co., Ltd., a global pioneer in professional security solutions for surveillance systems specializing in edge-AI-powered cameras, public safety, and medical devices, celebrate key milestones and achievements that will shape the future of the security industry.
Established in October 2019, as a spin-off from Panasonic’s Security Systems Business Division, i-PRO is in a unique position in the security market, combining the drive and innovative spirit of a start-up company with the rich heritage and skillset acquired through over 60 years of innovation with Panasonic.
Focused on growing the business with new technologies, supported by a new vision and a new strategy, i-PRO EMEA offices celebrate their 1st anniversary as an independent company.
i-PRO’s mission is to make AI capabilities universally available across the surveillance market. Over the last year, the company has introduced over 100 new cameras equipped with AI, (including an award-winning multi-sensor camera) making i-PRO one of the most innovative companies in the security market.
Using powerful Ambarella chips, i-PRO cameras have AI-power which enables them to run multiple analytics
AI cameras are not all created equal: i-PRO’s AI implementation is different from other products on the market. Using powerful Ambarella chips, i-PRO cameras have incredible AI-power at their disposal which enables them to run multiple analytics simultaneously.
Edge processing, especially with AI-based object detection and attribute data, unburdens backend servers, whether they are local or in the cloud, and enables a system to scale without significant additional costs.
According to Novaira Insights, AI deep learning will represent 58% of the worldwide surveillance camera market by 2026. We believe that the ability to analyze data, count people, recognize license plates, identify vehicles, colors, etc. should be a standard offering on cameras.
With AI-enabled cameras, customers can meet today’s needs while future-proofing their installations, without incurring significant costs,” said Norio Hitsuishi, Global Head of Product Management at i-PRO. “But more importantly, AI enhances real-time situational awareness and enables security to become proactive rather than reactive.
IoT and smart devices, including AI-based cameras with power on the edge, can be vulnerable to cyber-attacks that could put an entire organization’s network at risk.
Having achieved the highest level of cyber-security certification with up to FIPS 140-2 level 3 compliance, i-PRO’s solutions are NDAA compliant, trustworthy, and cybersecure.
Cybersecurity is a global matter and i-PRO aims to be the leader in open AI-edge computing”
As cyber threats continue to evolve and become more sophisticated, it’s imperative to educate ourselves, systems integrators, and end users on best practices and what to look for when specifying a resilient system.”
Cybersecurity is a global matter and i-PRO aims to be the leader in open AI-edge computing through powerful NDAA compliant and cyber secure hardware, to provide metadata integrity,” said Gerard Figols, President, i-PRO EMEA B.V.
Despite rapid inflation and industry component shortages, i-PRO has also been committed to maintaining competitive prices. The company also introduced a Quick Delivery Service with a two-to-three-day delivery timeframe for key models to ensure that its partners can realize their project requirements promptly.
Lead times for i-PRO orders have been far less than other manufacturers thanks to the company having its factory and managing component stock efficiently.
We have been able to manufacture and deliver products reliably and in a timely fashion”
Thanks to our manufacturing facilities and our close partnership with key suppliers, we have been able to manufacture and deliver products reliably and in a timely fashion.”
This underlines i-PRO’s commitment to be a flexible and agile manufacturer for our customers, and positions us as the trusted next-generation partner for the security industry,” said Figols.
The AI segment of the surveillance camera market is growing fast and so is i-PRO’s camera lineup. To provide its stakeholders with trusted and dynamic ways to access information and resources. i-PRO is putting in place several tools and initiatives to ensure a seamless experience for its partners and clients.
This includes the launch of the new i-PRO Active Learning platform to get access to on-demand courses on i-PRO’s latest products and technologies, as well as documentation and technical support. “In this fast-moving market our prime objective is to help partners grow and stay on top of their game to ensure mutual knowledge and growth,” says Gerard Figols.
e-con Systems Introduces RouteCAM_CU20
Fibra Technology: How To Install A Wired Security System In 6 Hours
DKS: 1620 Lane Barrier Animation
When the Utah Transit Authority (UTA) decided to expand their rail lines in 2013, they knew that their surveillance systems would need a major upgrade to keep both passengers and property safe and secure. An open platform video management software (VMS) solution and flexible storage proved to be the clear choice to efficiently support a growing public transit system as new business opportunities came to the region. Challenge: safe public transit sets the stage Local leaders know that a top-notch public transit system makes a region more desirable to relocating businesses. And while accessibility is foremost, security is of immense importance, with passengers placing a premium on safe transportation. The right choice was a VMS that was much more flexible and efficient In 2014, the UTA was building a new transit line and was eager to display an improved surveillance system to state dignitaries. Their video security system needed upgrading from one that was limited by the capacities of its servers, to accommodate a 500-camera expansion. The right choice was a VMS that was much more flexible and efficient. Solution: centralized expansion is on track: Milestone XProtect® VMS platform Network cameras from Axis, Panasonic, IQeye, and DW® HP servers from BCDVideo Implementation by Diamond Partner Stone Security Flexible software design to further expand the system
Milestone VMS supports many different kinds of cameras and allows more devices on platforms while centralizing the control system. The security camera views are accessible by dispatch, commuter, rail control centers, and other authorized users. The 1000+ camera system as of 2015 operated with nine HP servers (eight for recording and one for management). With this system in place, UTA could expand to 2,000 cameras or more. Result: staying ahead and following up Milestone marries two critical components: a centralized system and a lot of diversity in its deployment Milestone marries two critical components: a centralized system and a lot of diversity in its deployment. The open platform provides a best-of-breed software integration model and ensures that UTA isn’t tied to any one technology, accommodating future growth. The significant improvement in video quality made it easier to monitor and investigate any adverse events. The system function called Evidence Lock allows extension of the retention time for video recordings from selected cameras. And the encrypted video footage has authenticated time stamps, which is useful when exporting video to be presented in court. The use of Milestone technology had a positive financial impact for UTA. Gate arms at rail crossings frequently get damaged or broken off by motor vehicles. Prior to the Milestone installation, these costly incidents would often go unresolved. The new camera deployments helped police to follow up on incidents and even recoup damages. Preventing serious incidents The Milestone VMS lets staff check the alarm by accessing the video remotely, saving time and money UTA equipped its system with monitoring alarms in 19 locations, mostly in remote buildings that require navigating through difficult terrain. The Milestone VMS lets staff check the alarm by accessing the video remotely, saving time and money. The system has also been used to prevent serious incidents. When a driver failed to report his truck stalled on a train track, the incident was observed in the VMS by a UTA technician who notified rail authorities. In that instance, Milestone helped avert a serious and potentially life-threatening accident. “Milestone has saved us tens of thousands of dollars by allowing us to better monitor and investigate transit incidents and accidents.” – Video Security Administrator, UTA.
Cloud systems faced early resistance from physical security end users concerned about a perceived lack of control of data that ‘leaves’ their premises. More recently, mass adoption of cloud systems reflects widespread confidence in these systems to protect the data they handle. However, there are physical security professionals who remain concerned about cloud-based systems from the perspective of cybersecurity. We asked this week’s Expert Panel Roundtable: How can the industry address cybersecurity concerns of cloud-based systems?
The growing mobile ownership rate, the emergence of more user-friendly banking apps, the tech-native younger generation, and, of late, the pandemic-induced shift to online, all create a fertile ground for mobile banking. Unfortunately, the acceleration of banking app adoption today goes hand in hand with the increase of targeted security threats. In 2022, a month wouldn’t go by without a headline-making mobile banking attack or incident that resulted in stolen funds and sensitive personal information from thousands of users. Security as an afterthought  Nevertheless, a fair share of BFSI companies persists to treat security as an afterthought during and after mobile banking app development. The 2021 State of Mobile Banking App Security report shows that 82% of enterprise executives consider mobile channels important. However, 39% of respondents did not run any vulnerability analysis or penetration tests on their mobile solutions. Five-step guide Neglecting a banking app’s security is a dead-end track that leads to severe financial repercussions In the turbulent threat landscape of today, neglecting your banking application’s security is a dead-end track that leads only to severe financial and reputational repercussions. Being banking software developers with a long-standing experience in cybersecurity, we devised a five-step guide to help financial institutions build shell-proof mobile banking apps, maintain them this way, and safeguard customers from mobile security troubles. #1: Test security throughout SDLC and beyond The safety of mobile banking is a subject of many regional and industrial standards, so companies traditionally design the security architecture of their apps around these guidelines and call it a day. While regulatory compliance is vital, financial institutions often mistakenly bank on it alone and perform security-related activities late in the SDLC. As a result, there is a good chance pre-release quality assurance (QA) can discover deeply ingrained security flaws that will require fundamental corrections. What’s even worse, if the QA fails to do so, the app will be released with inherent vulnerabilities. Threat modeling  Engineers should not only implement security controls into the source code but also review it for bugs and flaws The best way to make an app safe by design is to integrate security testing into the development lifecycle. At the start of the project, the team needs to explore relevant external and internal threats and, drawing on the analysis, specify security requirements for the application alongside functional and performance ones. At the design stage, it’s a great practice to perform threat modeling, as it allows developers to understand which elements of the app require protection most and what security controls will fit the purpose. Also, during the application development, engineers should not only implement security controls into the source code but also review it for bugs and flaws at each iteration. Thus, all vulnerabilities are rooted out immediately, before the app goes to production. #2: Implement a strong authentication layer Access control is the foundation of security, and mobile banking is no exception. By equipping an app with a proper authentication mechanism, banks ensure that only the customer is allowed to view and manage their personal funds, while third parties, malicious and not, are kept out, thus eliminating the risk of unauthorized access. Despite remaining a predominant user authentication method, passwords have long been showing their insufficiency in the modern threat landscape. Two-factor or biometric authentication Relying on physiological human characteristics to identify a person is highly accurate and spoof-proof Two-factor authentication, on the other hand, has many uses in the financial industry, and app user verification is one of them. Requiring two separate forms of identification, commonly a password and a single-use code sent via SMS, push notification, or email is still a much stronger secure option than passwords. Biometric identification is an authentication technology that gained traction only recently, but its efficiency propelled its adoption as a verification method in mobile apps across industries, with finance leading the way. Relying on physiological human characteristics, such as fingerprints, facial features, voice, or iris to identify a person, the technology is highly accurate and spoof-proof. #3: Encrypt user data and communications Financial institutions are no strangers to encryption. Most banks today leverage the virtually unbreakable 256-bit advanced encryption standard (AES) or equivalent methods to make customers’ personal and payment information inaccessible to unauthorized parties. Needless to say, a mobile banking app should incorporate similarly robust encryption mechanisms to protect user data. It can be the customary AES, but it can also be another encryption technology that fits the app’s specifics better. Transport Layer Security protocol It’s necessary to bake in specialized encryption mechanisms for securing app-to-device commu
nication It is also important to secure the traffic between the app and the server, and the Transport Layer Security protocol (TLS) fits the bill here. Things can get more challenging if you plan on integrating your mobile app with wireless BLE and IoT technologies for proximity-based marketing, in-branch experience personalization, and wayfinding. In this case, it’s necessary to bake in specialized encryption mechanisms for securing app-to-device communication and ward off man-in-the-middle attacks. # 4: Integrate in-app protection    In recent years, due to the growth of malware targeting applications, bank customers were increasingly plagued with malicious software of all stripes. Of course, these days, there is strict oversight over financial cybercrime, and specialized law enforcement together with private-sector IT specialists usually take prompt measures to disarm emerging malware. Nevertheless, considering the steadily growing adoption of mobile banking, malicious software targeted at new apps will continue surfacing monthly while the existing scripts will be upgraded to circumvent dedicated safeguards. In-app protection By relying on in-app protection, banks can efficiently shield their app from emerging attacks To be a step ahead of the attackers, financial institutions need to embrace a more comprehensive approach and consider bolstering source-code security controls with robust in-app protection features. Designed by cybersecurity tech companies, in-app protection is a set of tools that can be easily integrated into an application. These solutions typically include mechanisms for security monitoring and malware detection, network connection manipulation, and external tampering that vendors update on a regular basis. Thus, by relying on in-app protection, banks can efficiently shield their app from emerging attacks. #5: Raise customers’ security awareness Regrettably, after the release, your mobile banking app’s security is not completely in your hands. Users’ poor choices can easily obliterate all the efforts towards building and maintaining the solution impregnable. Some can turn off biometric authentication if they see no point in it, while others can click on a phishing link because it is sent from a domain looking just like yours. Hence, it’s not enough to deliver a highly protected mobile banking solution, you should also teach users how to render their app experience safe.   Security education  Banks need to educate their customers about the benefits and dangers of trusting third parties with app credentials First and foremost, banks need to educate their customers about good mobile banking security habits, from the importance of strong passwords and the benefits of two-factor or biometric authentication to the dangers of trusting third parties with app credentials and using public networks when conducting financial operations. However, banks should present this information in a detailed but engaging way, for example through short posts or animated videos, otherwise, there are a high chance customers will not bother to pay heed to it.  Stay alert to stay secure Over the recent years, mobile banking has burgeoned, but with this growth came a whole new set of threats, exploiting apps’ inherent vulnerabilities, loose security controls, and customer unawareness, with the burden of warding them off falling on their owners. The battle for mobile banking security is ongoing, and to win it, banks need to respect security basics while also remaining open and flexible regarding emerging security tech.
Public-Private Partnerships On Campus: What You Need To Know
A More Secure Alternative to 125 kHz Proximity Cards
5 Ways To Strengthen Physical Security With An Integrated System
Anatomy of a False Alarm
Artificial Intelligence
Matthew Tomao Joins ISS As Regional Business Manager
Guidepost Solutions Announces The Creation Of ‘Centers Of Excellence’ Across The Security And Technology Consulting Division
360 Vision Technology announces Middle East region partnership with BDS
Pelco Sarix® Multi Pro Camera series
Anviz C2 Series Biometric Identification And RFID Card Access Control & Time Attendance Devices
Vanderbilt Feenics Cloud-Based Enterprise Access Control Platform
Follow us
DMA
SecurityInformed.com – Making The World A Safer Place
Copyright © Notting Hill Media Limited 2000 – 2022, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACInformed.com | MaritimeInformed.com
Make the best use of the latest technology for building design and construction

source


CyberTelugu

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top

Adblock Detected

Please consider supporting us by disabling your ad blocker

Refresh Page