Showing posts with label Arindam Bhadra. Show all posts
Showing posts with label Arindam Bhadra. Show all posts

Wednesday, November 1, 2023

Why Choose a Video Remote Monitoring

Why Choose a Video Remote Monitoring 

In the dynamic landscape of 2023, remote video monitoring has emerged as a transformative force, revolutionizing the way businesses approach security and surveillance. With the integration of advanced technologies, such as high-definition cameras, cloud-based storage, and artificial intelligence, this cutting-edge solution offers real-time access to critical video data.

In 2023, remote video monitoring providers understand that each business has distinct security requirements. By collaborating closely with clients, they deliver personalized solutions that align with specific needs, ensuring maximum protection.

Remote video monitoring providers offer expert advice on camera placement and configuration to achieve the most effective coverage. Whether it’s monitoring high-risk areas, entry points, or internal processes, their expertise ensures no aspect of security is overlooked.

What is Remote Video Monitoring, and How Does It Work?

Remote video monitoring is a cutting-edge security solution that enables real-time observation of multiple locations through networked cameras. In 2023, AI-powered analytics, cloud storage, and remote access features make this system an essential tool for businesses seeking enhanced security.

How Much Does a Remote Video Monitoring Service Cost?

The cost of a remote video monitoring service varies depending on factors such as the size of the property, the number of cameras required, and additional features. In 2023, many service providers offer customizable packages to suit different budgets and needs.

Can Remote Video Monitoring Be Tailored to My Business Requirements?

Absolutely! In 2023, remote video monitoring services can be tailored to fit the unique needs of different industries. Whether you operate a cannabis facility, a logistics centre, or any other business, a customized solution can be designed to address specific security challenges.

What is Remote Video Monitoring?

Remote video monitoring refers to the advanced surveillance technique that enables users to access real-time video feeds from remote locations through a secure network. It offers a proactive approach to security, allowing businesses to respond swiftly to potential threats and streamline operations efficiently.

What are the Benefits of Remote Video Monitoring?

Remote video monitoring comes with a plethora of benefits, including enhanced security, reduced response times to incidents, cost savings through optimized operations, and the convenience of accessing surveillance footage from anywhere with an internet connection.

How Can I Monitor My Surveillance Camera Remotely?

Monitoring your surveillance cameras remotely is easier than ever. By connecting your cameras to a remote video monitoring system or an app, you can view live feeds, receive real-time alerts, and even review stored footage, providing you with peace of mind and control over your security.

What is RVR Security?

RVR security stands for “Remote Video Recording” security, which allows users to store video footage remotely on secure servers or cloud storage. This ensures that critical footage is protected even if the physical recording device is compromised.

What is an Example of RVR?

An example of RVR would be a retail store that uses remote video recording security to store video footage off-site. In the event of a burglary or incident, the recorded footage remains safe and accessible for investigative purposes.

Why is it Called RVR?

The term RVR, or Remote Video Recording, succinctly describes the process of recording video data remotely, typically in off-site locations or cloud servers. It emphasizes the vital aspect of securing footage independently from the physical camera system.

Can I Monitor My CCTV from My Phone?

Absolutely! With the advancements in technology, many remote video monitoring systems offer mobile applications that enable users to access their CCTV cameras on smartphones and tablets, making surveillance convenient and accessible on the go.

Is There an App for Monitoring CCTV?

Yes, numerous apps are designed specifically for monitoring CCTV systems remotely. These user-friendly applications allow users to monitor live video feeds, receive real-time notifications, and manage camera settings all from the palm of their hand.

Which IP Camera is Best?

The choice of the best IP camera depends on your specific requirements. Factors to consider include resolution, field of view, low-light performance, audio capabilities, and integration with remote video monitoring systems. It’s essential to select a reputable brand known for reliability and superior performance.

Why Choose a Video Remote Monitoring System? Six Reasons.

1. Comprehensive Property Coverage

In 2023, a top-notch video remote monitoring system offers unmatched coverage, allowing businesses to keep a watchful eye on their entire property. With strategically placed high-definition cameras, blind spots become a thing of the past, ensuring no potential threat goes unnoticed.

2. Peaceful Sleep with Enhanced Security

With a robust video monitoring system in place, business owners can finally rest easy at night. Knowing that their property is under vigilant watch and potential incidents are promptly addressed brings a sense of peace and tranquility.

3. Cost Savings for Your Business

Accepting remote video monitoring system in 2023 is not only a wise security decision but also a smart financial move. By eliminating the need for on-site security guards round the clock, businesses can experience significant cost savings without compromising safety.

4. Real-Time Human Verification of Alarms

Gone are the days of false alarms triggering unnecessary panic. With remote video monitoring, alarms are verified by real humans, reducing false alerts and providing swift responses to genuine security breaches. This invaluable feature instills confidence and trust in the system, elevating the overall effectiveness of surveillance.

5. Faster Emergency Response in Critical Situations

Time is of the essence when dealing with security threats. In 2023, remote video monitoring systems facilitate rapid emergency response by providing live video feeds to authorities. This immediate access ensures a swift and coordinated reaction to any potential danger.

5. Incident Footage Storage for Crucial Insights

Remote video monitoring systems go beyond real-time surveillance. In 2023, advanced storage solutions allow businesses to retain incident footage for future reference and analysis. This historical data is a valuable resource for identifying patterns, improving processes, and making informed decisions.

6. 24/7 Support and Monitoring

24/7 live video surveillance offers numerous benefits. Immediate response to incidents, real-time updates, and comprehensive coverage, just to name a few. But one often overlooked advantage is its deterrence factor.

When people know they are being watched live, they are less likely to engage in unauthorized activities. The psychological impact of live surveillance can be quite powerful!

In addition, having access to 24/7 video footage can be vital for legal reasons. In case of any incident, you have documented evidence at your disposal. Let’s face it, in this era, “seeing is believing.” And live video monitoring provides that proof, anytime, all the time.

7. Legal Implications

Hmm, it makes one wonder, doesn’t it? How can live video monitoring have legal implications? Well, for starters, these services often come equipped with features such as timestamping and watermarking.

This ensures the integrity of the footage and helps establish it as a legitimate piece of evidence in a court of law.

Moreover, live video monitoring services often store their footage on secure servers, sometimes even offering cloud-based storage. This not only ensures the safety of the footage but also its easy retrieval in the event of a legal dispute. You never know when you might need that critical piece of evidence, right?

Sunday, October 15, 2023

Maintenance of the Security Bollard

Maintenance of the Security Bollard 

A high security bollard or entrance control bollard system is designed to deter or completely stop unauthorised entrants, assets or vehicles whilst enforcing the use of an access control system to ensure the ‘one token one person’ rule applies. Bollards are used to protect areas that are either completely pedestrianised, or to restrict vehicle access. Bollards also act as a great security measure for businesses and shop fronts too. Bollards are made from sturdy materials, they can sometimes be damaged or develop wear and tear over time.

The weather can have a large impact on the condition of a bollard. Going from hot to freezing temperatures can cause cracks over time. Likewise, long periods of heavy rain over the years can result in imperfections, especially where wooden bollards are concerned. That’s why it’s important to check your bollards regularly, especially if there has been an extreme change in weather. Metal bollards are less susceptible to weather damage, but over the years it may create some issues.

Bollards are usually found next to roads, or within car parks, and this means it’s not unlikely that one or two will come in contact with a vehicle. Bumps and scratches can occur, and over time this may lead to permanent damage to your bollards. A CCTV system can help to document any accidents around your perimeter and to check the severity of the damage. If any serious damage is caused, it is always best to replace the bollard.

Learning to check your bollards for damage is a great way to improve their overall maintenance. Regularly inspecting them for cracks and breaks means that they can be fixed quicker and no lasting damage will occur. If you have had your bollards for a long time, the exposure to various weather conditions may have caused them to rust or for parts to loosen. With this in mind, make sure to check them frequently. Dirt can also build-up on bollards, so giving them a quick clean every now and then will improve their performance greatly.

Safety Instructions

All personnel who are applicable for the operation of the bollard, including back up personnel, must be thoroughly familiar with the operation and safety regulations.

Any maintenance and repairs must only be implemented by certified technical personnel.

No persons and/or vehicles are allowed into the area over the blocking element when the bollard is functional.

The closing element must be extended early enough that approaching vehicles can still stop in time.

If the bollard functions are activated with neglect to the afore mentioned points the manufacturer cannot be held liable for any damages that may result to any person and/or property.

Before the maintenance work can begin all safety precautions must be adhered.

Monthly Maintenance by the Operating Personnel

After the control the stated changements in comparison to the original condition should be eliminated by corresponding counter measures.

The following points are to be visually examined:

Barrier bollard

1) Clean any contamination on the annular gap between the bollard and the cover of the standpipe

2) Check the extended blocking element for damages, e.g. impact, allow damage repair

3) Check for faultless bollard movement and pay attention to any unusual noises

Drive Unit

1) Check the hydraulic screws, oil tank and hydraulic units for leakage

2) Check the intactness of the hydraulic hoses

3) Check the oil level (level should be within the mark)

4) Check the intactness of the cover seals

First maintenance service by a machine expert

The first maintenance service should be made by a machine expert within the 1 quarter after the installation.

A. Barrier bollard

a) Clean bollard completely from dirt

b) Screw-out bollard cover and examine fixation of the hydraulic cylinder

c) Examine the piston rod and the hose connections of the cylinder on leakages through light beam of a pocket lamp.

d) Examine speed position above one -way restrictor and adjust once or if necessary the approximate direct running of the bollard running-out movement.

Bollard housing

a) Screw-off cover of the bollard housing and examine fix position of the proximity switch.

b) Clean cover and inner space of the bollard housing and clean if achievable from dirt.

c) Note, if penetrated surface water has flown above the drain channel, eliminate eventual obstructions. There should not be water in the bollard housing.

d) Note purification degree on the bottom of the bollard housing. At bigger dirt, especially in the construction phase.

Drive unit

a) Clean drive unit completely from dust and dirt.

b) Examine adjustment of the pressure limit valve for the operation pressure Manometer indication until. 50-60 bar allowed. 

Semi-Annual maintenance service by a machine expert

The semi-annual maintenance is to be performed by a machine specialist. It covers the visual examination as described under Point 1 and the following additional work:

Blocking Element

a) Clean the entire blocking element

b) Unscrew the blocking element cover and check the hydraulic cylinder mounting as well as checking the tightness of the electrical limit switches

c) Check the piston rods and hydraulic cylinder hose connections for leakage (use a torch / flashlight)

d) Check the approximate synchronisation of the bollard drive-out movement in multiple systems, if necessarily adjust the speed at the one-way restrictor.

Standpipe

a) Clean cover and interior, within reach, of any contamination

b) Check the drainage connection, if necessary remove any blockage

c) Determine the degree of pollution on the bottom of the standpipe. With large soil accumulation, particularly in the building phase, cleaning may be necessary.

Drive Unit

a) Clean the dust and dirt from the entire hydraulic unit.

b) Check the operating pressure, if necessary adjust the pressure release valve (approx. 50-60 bar)

Extensive maintenance service by a machine expert

The extensive maintenance service is after 1000 operation hours, but at least each 2 year. Additionally to the first maintenance service the following works should be made.

a) Examination of all functional components, combinations and screwing on integrity and fix position.

b) Exchange of the hydraulic liquid. Open filler cap and guide the hydraulic liquid into the sanitation container.

c) Use the unused hydraulic liquid, of the type of the first filling, to be bought from the bollard manufacturer.

d) Make functional test and if necessary, proceed to adjustment.

e) Examination of the control by an expert. Examine condition of the control and perfect working procedure of the electrical components.

The observance of the maintenance intervals and the execution of the maintenance works guarantee a free disturbances operation and maintenance of the installation.

Get in touch

Here at Expert Security we offer a range of bollards, along with maintenance service to keep them in top condition. Our maintenance cover includes a professional service, provided by our repair engineers, to regularly check your bollards. This will reduce the risk of malfunction or damage. These routine checks will be scheduled in advance and afterwards we will provide a range of detailed reports surrounding the visit. For more information on any of the security options above, or for further advice on how to protect your business premises from criminals, please contact us here or Email us on ssaintegrate@gmail.com

Sunday, October 1, 2023

Maintenance of security levels CCTV Cameras

Maintenance of security levels at Construction sites through CCTV Cameras! 

There is no sense in denying what is apparent, but a construction site is an area that has constant traffic all day long and sometimes during the night as well. Most managers are often forced to increase productivity levels at the site to meet the requirements of the building owners.

However while completing the construction job on time might be an excellent idea, keeping track of all the activities that occur at the site often provides to be challenging task especially for project managers.

More so, security companies often find it difficult to come up with genuine evidence to back criminal offenses that may occur at the given construction site. With the advent of special technological contrivances such as CCTV security system, managing a construction site has become that much more simple.

See average Number of Security Cameras below:

Project Type

Average Number of Security Cameras

Small Residential Project

4-8

Medium Residential Project

8-16

Large Residential Project

16-32

Small Commercial Project

8-16

Medium Commercial Project

16-32

Large Commercial Project

32-64

Industrial Site

32-64

Infrastructure Development

64+

Benefits of Installing CCTV Systems:-

1. Monitor construction workers

One important benefit of installing CCTV systems at the construction site is that it allows the project managers to have a better view of the employees` activities. To be specific, the construction site is often a beehive of activity, which can sometimes pose a challenge for managers who are supposed to account for everything.

In the past, the managers would have to rely on unreliable reports from their subordinates or perhaps spend hours going around the entire site to determine the worker’s activities. This was a highly unreliable method, and CCTV cameras provide a better solution for such a complication.

In fact, construction managers can monitor their employees work rate levels by watching recorded or the live footage that is relayed by the cameras.

2. Evaluating the site

Besides that, another important benefit of installing these types of cameras at the constructions site is that it provides the managers with a better option for viewing the progress of the entire site. It’s important to note that CCTV footage along with individual devices such as drones are often used to determine the progress of a given construction project. Managing the site is highly important since it allows the managers to determine whether additional resources such as skilled labor or resources are needed to complete the project.

While the manager might still have to visit the site for first-hand observation, the CCTV cameras are also convenient since they provide footage of how the events at the site have been unfolding.

3. Determining resource usage

More importantly, the CCTV systems can also be used to determine the level of resource usage at the construction site. This is because the level of activity at the site of often so high such that the construction manager cannot be able to account for resource usage at the scene fully. Some of the resources that need monitoring include cement, hardware tools and employee gear amongst many others.

With this types of systems, the manager can easily determine where any inconsistencies or perhaps where there was any illegal activity occurring at the site and therefore deal with it as soon as possible. As a result, the manager is better at accounting for resource usage or perhaps identifying any project setbacks on time.

4. Help improve security at the site

One of the biggest hindrances that most constructions projects face is the maintenance of security levels at the site, especially when no one is watching or perhaps when the site has been dormant for a while. For security companies, the footage can be used to determine any inconsistencies or perhaps any illegal activities that may be taking part at the site.

The footage always provides an excellent perspective when it comes to settling security complications in criminal cases. By installing CCTV security systems at the scene, construction managers can determine any form of illegal activities or perhaps the theft of costly resources that are used for the completion of construction projects.

While the presence of security cameras is often enough to deter the vast majority of would-be thieves and vandals, you will have access to the video evidence required for successful prosecution should trespassers ever infiltrate your site. Not only are CCTV cameras more cost-effective security solution than man guarding, but you can also access live footage around the clock remotely via the internet should you ever wish to.

Given all these points, when it comes to managing an entire construction project, there is barely any space for poor decision making or perhaps insufficient improvisation. It’s imperative that you take the time to make an informed decision for the development of your project and this often includes settling for the superior benefits of CCTV systems. Although these types of security systems might cost a significant amount to install, they are crucial towards the completion of the entire project are therefore a feasible investment for any given construction project.

Below you'll find a range of security cameras for construction sites with different features. It's also possible to purchase a combination of cameras to suit different construction site needs.

Camera Model

Description

Benefits for Site Manager/Construction Company Owner

XYZ Construction

High-definition camera with night vision

1. Enhanced site security, deterring theft and vandalism.
2. Improved safety monitoring to prevent accidents and ensure compliance.
3. Remote access for real-time monitoring and peace of mind.

Site Secure Pro

Robust weatherproof camera with wide-angle

1. Extensive coverage to monitor the entire construction site.
2. Quick and accurate identification of unauthorized access or safety breaches.
3. Effective risk management and reduced liability for the company.

Construction Eye

360-degree panoramic camera

1. Comprehensive view to monitor multiple areas simultaneously.
2. Simplified installation and reduced need for multiple cameras.
3. Increased efficiency and productivity by minimizing blind spots.

Heavy Guard

Vandal-proof camera with advanced motion

1. Durable and tamper-resistant, ensuring continuous surveillance.
2. Improved project management and reduced losses due to theft.
3. Quick detection and response to potential safety or security incidents.

Watch Mega

Ultra-high-resolution camera for detailed

1. Clear and detailed footage for accurate incident investigations.
2. Improved monitoring of construction progress and worker activities.
3. Advanced analytics for data-driven decision-making and process optimization.


Tuesday, February 14, 2023

Trends at the intersection of video and AI

Trends at the intersection of video and AI 

Installation and use of CCTV Cameras for security & surveillance is a no-brainer. Cameras are considered a fundamental commodity for setting up any surveillance infrastructure, but at the same time, 24×7 monitoring of hundreds or thousands of video feeds by operators doesn’t serve the purpose of providing proactive surveillance and quick response to breaches.

2022, where most security cameras deliver HD performance, with more and more models offering 4K resolution with 8K on the horizon. Advanced processing techniques, with and without the use of infrared illuminators, also provide the ability to capture usable images in total darkness; and mobile devices such as drones, dash cams, body cams, and even cell phones have further expanded the boundaries for video surveillance. Additionally, new cameras feature on-board processing and memory to deliver heightened levels of intelligence at the edge.

But video has evolved beyond the capabilities of advanced imaging and performance to include another level:  Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise.

This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends:

 

1) Purpose-built performance

Several video analytics technologies have become somewhat commoditised “intelligent” solutions over the past few years, including basic motion and object detection that can be found embedded in even the most inexpensive video cameras. New, more powerful, and intelligent video analytics solutions deliver much higher levels of video understanding.

This is accomplished using purpose-built deep learning, employing advanced algorithms and training input capable of extracting the relevant data and information of specific events of interest defined by the user. This capability powers the automation of two important workflows: the real-time monitoring of hundreds or thousands of live cameras, and the lightning-fast post-event search of recorded video. Vintra video analytics, for example, accomplishes this with proprietary analytics technology that defines multi-class algorithms for specific subject detection, classification, tracking, and re-identification and correlation of subjects and events captured in fixed or mobile video from live or recorded sources.

 

2) Increased security with personal privacy protections

The demand for increased security and personal privacy are almost contradictory given the need to accurately identify threatening and/or known individuals, whether due to criminal activity or the need to locate missing persons. But there is still societal pushback on the use of facial recognition technology to accomplish such tasks, largely surrounding the gathering and storage of Personally Identifiable Information (PII).

The good news is that this can be effectively accomplished with great accuracy without facial recognition, using advanced video analytics that analyse an individual’s whole-body signature based on various visual characteristics rather than a face. This innovative approach provides a fast and highly effective means of locating and identifying individuals without impeding the personal privacy of any individuals captured on live or recorded video.

 

3) Creation and utilisation of computer vision

There are a lot of terminologies used to describe AI-driven video analytics, including machine learning (ML) and deep learning (DL). Machine learning employs algorithms to transform data into mathematical models that a computer can interpret and learn from, and then use to decide or predict. Add the deep learning component, and you effectively expand the machine learning model using artificial neural networks which teach a computer to learn by example.

The combination of layering machine learning and deep learning produces what is now defined as computer vision (CV). A subset but more evolved form of machine learning, computer vision is where the work happens with advanced video analytics. It trains computers to interpret and categorize events much the way humans do to derive meaningful insights such as identifying individuals, objects, and behaviours.

 

4) Increased operational efficiencies

Surveillance systems with a dozen or more cameras are manpower-intensive by nature, requiring continuous live or recorded monitoring to detect and investigate potentially harmful or dangerous situations. Intelligent video analytics, which provides real-time detection, analysis, and notification of events to proactively identify abnormalities and potential threats, transform traditional surveillance systems from reactive to proactive sources of actionable intelligence. In addition to helping better protect people, property, and assets, advanced video analytics can increase productivity and proficiency while reducing overhead.

With AI-powered video analytics, security and surveillance are powered by 24/7 technology that doesn’t require sleep, taking breaks, or calling in sick. This allows security operations to redeploy human capital where it is most needed such as alarm response or crime deterrence. It also allows security professionals to quickly and easily scale operations in new and growing environments.

 

5) A return on security investment

The advent of advanced video analytics is slowly but surely also transforming physical security systems from necessary operational expenses into potential sources of revenue with tangible ROI, or as it is better known in the industry, ROSI – Return on Security Investment. New video analytics provide vast amounts of data for business intelligence across the enterprise. Advanced solutions can do this with extreme cost-efficiency by leveraging an organization’s existing investment in video surveillance systems technology.

This easy migration path and a high degree of cost-efficiency are amplified by the ability to selectively apply purpose-built video analytics at specific camera locations for specific applications. Such enterprise-grade software solutions make existing fixed or mobile video security cameras smarter, vastly improving how organizations and governments can automatically detect, monitor, search for and predict events of interest that may impact physical security, health safety, and business operations. For example, slip-and-fall analysis can be used to identify persons down or prevent future incidents, while building/area occupancy data can be used to limit crowds or comply with occupancy and distancing guidelines. In this way, the data gathered is a valuable asset that can deliver cost and safety efficiencies that manual processes cannot.

 

6) Endless applications

The business intelligence applications for advanced video analytics platforms are virtually endless including production and manufacturing, logistics, workforce management, retail merchandising and employee deployment, and more. This also includes mobile applications utilising dashboard and body-worn cameras, drones, and other forms of robotics for agricultural, oil and gas, transportation, and numerous other outdoor and/or remote applications.
An added benefit is the ability to accommodate live video feeds from smartphones and common web browsers, further extending the application versatility of advanced video analytics.


Indian Army to be equipped with AI-based threat assessment software linked to national databases
The Indian Army will soon get help from artificial intelligence to analyse threats during operations, especially in sensitive areas like Jammu and Kashmir. The ministry of defence is planning to equip the army with an AI-based threat assessment software that can be linked to national databases such as UIDAI and MoRTH.
According to an official communication, this software will be used to “track vehicular movement, monitor online presence of individuals, including on social media platforms, and derive linkages and patterns”.
The software will help the army in tracking and predicting incidents and the reason behind acquiring such a software is that operations require a detailed threat assessment. As of now, details of threat assessment are not available with either security forces or law enforcing agencies but only restricted information is available in the form of registers, both at company operating base (COB) levels and with other headquarters.
“Since the data is either non-existent or is recorded in legacy formats (documents and registers), no methods are available with SF for historic correlation of incidents due to which incidents cannot be tracked or predicted,” the official communication states.
The solution: “an AI-based networked solution that will enable storage and analysis of data to track and predict incidents. Details can be linked with national databases such as UIDAI, MoRTH in order to track vehicular movement, as also monitor online presence of individuals including on social media platforms and derive linkages and patterns”.
The software will have the ability to import data available with other agencies. It will enable central collation of details from various patrols with real-time data visibility at all outstations. According to the MoD, this software will be able to integrate legacy unstructured data available in different formats and provide actionable intelligence by combining different databases through the use of AI and data analytics techniques.
The software application is designed to integrate AI and machine learning (ML) aspects with existing known datasets, thereby giving commanders and staff a comprehensive and common picture with regard to operations intelligence, including the capability to carry out data processing in terms of staff checks, query management, use of business intelligence and visualisation to arrive at a course of actions and also assist in ruling out less viable options.
“As the system is being planned keeping in mind the automation requirements of the Indian Army for intelligence generation, the system will be designed for exploitation by AI and ML aspects,” the MoD said. The software will facilitate display and exchange of information over encrypted and secured internet connection and facilitate day-to-day functioning of operations and intelligence gathering and collating at various headquarters, and also facilitate commanders in decision making by incorporating appropriate inputs.
Adequate security measures will be ensured as per the latest guidelines or policies of army cyber group (ACG) system. It will have NLP (natural language processing) models in English, Hindi, Pashto, Arabic, and Urdu to automatically extract intelligence from generated reports, inputs, open source documents and memos.
It will be capable of conducting video and image analytics for raw camera footage from CCTV cameras, social media videos, images among others. The whole idea is to generate actionable intelligence and ability to do dark and deep web monitoring and analysis.

Saturday, January 16, 2021

PCI DSS in Security Surveillance

PCI DSS in Security Surveillance
Access control & Video Surveillance vendors who sell to retail merchants have undoubtedly heard about PCI compliance, but may not understand exactly what it is and how it impacts the security industry. Thus, it’s no surprise that the Payment Card Industry Data Security Standard (PCI DSS) outlines specific guidelines for securing cardholder data environments (CDE) from a physical standpoint. This means protecting devices and systems (desktops, laptops, point-of-sale terminals, servers, routers, phones and other equipment), as well as the facility itself (office buildings, retail stores, data centres, call and contact centres and other structures). PCI compliance appears to be an issue between the payment card companies such as VISA and the merchants who accept credit cards. However, as merchants are being required to comply, they are passing some of the impact down to the vendors whose systems sit on their network.

Some users, professional now start asking is OEM camera, NVR, Access Controller are Compliance by PCI-DSS, “We need your system to be PCI compliant before we can put it on the network”. Reason is that in Aug 13, 2018 US Govt Ban HikVision & Dahua (and their OEMs) product due to backdoor entry & lots of security risk. On Aug 13, 2019 US Govt signed as a Law.

According to the latest standards, PCI DSS applies to all entities involved in payment card industry—including merchants, processors, acquirers, issuers, and service providers. PCI DSS also applies to all other entities that store, process or transmit cardholder data (CHD) and/or sensitive authentication data (SAD). To safeguard credit card data from being stolen through network breaches and ineffective IT security practices. Originally most card providers such as Visa and MasterCard had established their own proprietary rules regarding the handling of credit card data by merchants. Concern and confusion by the merchants over varying and overlapping requirements by the rival card companies prompted the card issuers to create an independent organization and standard for protecting credit card data. This entity is known as the PCI Security Council and while there are actually several standards, the most applicable to our industry is the PCI-DSS. To comply with the standard, you must use security cameras AND/OR access control in any sensitive areas. Sensitive areas are defined as below:

‘Sensitive areas’ refers to any data center, server room or any area that houses systems that store, process, or transmit cardholder data. This excludes public-facing areas where only point-of-sale terminals are present, such as the cashier areas in a retail store.
It is this need to secure the merchants entire network as well as the devices and software attached to the network that creates the demand for video surveillance vendors to meet PCI requirements, or more specifically, to provide solutions which are secure enough that they do not compromise the merchants network security plan. For a large retail store, this might be your server room, data closet, or anywhere else you have machines or servers that process cardholder data. The cameras must be at every entrance and exit so you can document who has entered and left this sensitive area.

This first is the inherent or built-in security that the solution has as it leaves the manufacturers back door. Many solutions being shipped today utilize highly vulnerable technologies such as web applications, non-secured operating systems and may even have a wide variety of exploitable technologies built into the product.

Manufacturers first need to understand the most current threats and then need to evaluate and adapt their architectural design to provide maximum inherent security.

One method to accomplish this is by having a valid and effective Software Development Lifecycle (SDLC) program in place which adheres to industry best practices, meets secure software development standards and has security activities and awareness built-in throughout the process.

The second way that network insecurity can be introduced into the merchants’ network is in how the product is deployed, configured and maintained. Many vendors feel that at this point it is out of their hands, but new pressures on the merchant from the PCI requirements are causing them to push back at the manufacturer.

Updated as part of PCI DSS version 3.0, Requirement 9 outlines steps that organizations should take to restrict physical access to cardholder data. Included under this requirement are guidelines that organizations must take to limit and monitor physical access to systems in the cardholder
data environment, such as points of sale (POS) systems. PCI DSS recommends deploying entry access control mechanisms or video security cameras to meet this requirement (or both). Additionally, they require companies to:
  • ü  Verify that either video cameras or access control mechanisms (or both) are in place to monitor the entry/exit points to sensitive areas
  • ü  Verify that video cameras (or access controls) are protected from tampering or disabling
  • ü  Review collected data and correlate with other entries
  • ü  Store video data (or access logs data) for at least three months

Beyond the requirements specific to physical security, PCI DSS outlines a range of measures that organizations must

The PCI Data Security Standard (DSS) specifically excludes the need to provide cameras over cash registers:

DSS 9.1.1: "Use video cameras and/or access control mechanisms to monitor individual access to sensitive areas. Review collected data and correlate with other entries. Store for at least three months, unless otherwise restricted by law. Note: - Sensitive areas refers to any data center, server room, or any area that houses systems that store, process, or transmit cardholder data. This excludes the areas where only point-of-sale terminals are present, such as the cashier areas in a retail store."

PCI DSS Compliance levels

PCI compliance is divided into four levels, based on the annual number of credit or debit card transactions a business process. The classification level determines what an enterprise needs to do to remain compliant.
·        Level 1: Applies to merchants processing more than six million real-world credit or debit card transactions annually. Conducted by an authorized PCI auditor, they must undergo an internal audit once a year. In addition, once a quarter they must submit to a PCI scan by an Approved Scanning Vendor (ASV).
·        Level 2: Applies to merchants processing between one and six million real-world credit or debit card transactions annually. They’re required to complete an assessment once a year using a Self-Assessment Questionnaire (SAQ). Additionally, a quarterly PCI scan may be required.
·        Level 3: Applies to merchants processing between 20,000 and one million e-commerce transactions annually. They must complete a yearly assessment using the relevant SAQ. A quarterly PCI scan may also be required.
·        Level 4: Applies to merchants processing fewer than 20,000 e-commerce transactions annually, or those that process up to one million real-world transactions. A yearly assessment using the relevant SAQ must be completed and a quarterly PCI scan may be required.


PCI DSS Compliance
Requirement 9: Restrict physical access to cardholder data
Any physical access to data or systems that house cardholder data provides the opportunity for persons to access and/or remove devices, data, systems or hardcopies, and should be appropriately restricted. “Onsite personnel” are full- and part-time employees, temporary employees, contractors, and consultants who are physically present on the entity’s premises. “Visitors” are vendors and guests that enter the facility for a short duration - usually up to one day. “Media” is all paper and electronic media containing cardholder data.
9.1 Use appropriate facility entry controls to limit and monitor physical access to systems in the cardholder data environment.
9.2 Develop procedures to easily distinguish between onsite personnel and visitors, such as assigning ID badges.
9.3 Control physical access for onsite personnel to the sensitive areas. Access must be authorized and based on individual job function; access must be revoked immediately upon termination, and all physical access mechanisms, such as keys, access cards, etc. returned or disabled.

Clearly, there's no explicit camera requirement here, but cameras are a good way to remaining in compliance with requirement 9.2. It's hard to know if you had a physical security breach if you don't have any video evidence.

PCI PED Compliance
3.4.5.2 Monitor, Camera, and Digital Recorder Requirements
a) Each monitor, camera, and digital recorder must function properly and produce clear images on the monitors without being out-of-focus, blurred, washed out, or excessively darkened. The equipment must record at a minimum of four frames per second.
b) CCTV cameras must record all activity, including recording events during dark periods through the use of infrared CCTV cameras or automatic activation of floodlights in case of any detected activity. This recording may be via motion activated. The recording must continue for at least a minute after the last pixel of activity subsides.
c) CCTV monitors and recorders must be located in an area that is restricted from unauthorized personnel.
d) CCTV cameras must be connected at all times to:
·        Monitors located in the control room
·        An alarm system that will generate an alarm if the CCTV is disrupted
·        An active image-recording device

Q30 March (update) 2015
Q. For purposes of this requirement, can motion activation recording be used, such that if there is not any activity and associated motion, there is not any need to record? If motion activation is allowed, how long past cessation of motion must be recorded?
A. This requirement is under revision. The new text will state: CCTV cameras must record all activity, including recording events during dark periods through the use of infrared CCTV cameras or automatic activation of floodlights in case of any detected activity. This recording may be motion activated. The recording must continue for at least ten seconds after the last motion has been detected. The recording must capture any motion at least 10 seconds before and after the detected motion.

Some of OEM done PCI DSS Compliance
For example: On March 19, 2015 - NUUO, a leading provider of surveillance video management solutions, today announced that its NUUO Crystal family (NUUO CrystalTM), as well as Mainconsole Family (NUUO Mainconsole Tri-Brid) solutions have received the Payment Card Industry (PCI) Data Security Standard (DSS) 3.0 certification.

Verkada (Cloud Camera Works) offers a technology solution that simplifies the process of meeting PCI physical security requirements. Unlike traditional CCTV systems, Verkada eliminates outdated equipment such as NVRs, DVRs and on-premise servers. The result: a system design that enables modern data security standards and innovative software capabilities by default.

3xLOGIC video surveillance vendor selected by our IS/IT department, also meet PSI DSS regulation.

Georgia CCTV understands that PCI-DSS compliance has become a requisite for restaurant operators. Safe guarding cardholder information and ensuring that PCI-DSS compliance standards are maintained is a material investment for companies in both time and resources. Georgia CCTV understands that for a retailer to achieve and maintain full PCI compliance, it is imperative that any services and devices that are part of or will become part of a merchant’s infrastructure also be PCI-DSS compliant.

ATLANTA, July 30, 2019 – Honeywell [NYSE: HON] announced the release of 30 Series IP Cameras, a new suite of video cameras that strengthens building safety and security through advanced analytics and secure channel encryption. They also adhere to the Payment Card Industry Data Security Standard (PCI-DSS) Together, these elements help meet the increasingly stringent requirements being set by IT Departments to shield businesses against unauthorized access and unsanctioned distribution.

Morpho is now IDEMIA, the global leader in Augmented Identity for an increasingly digital world, with the ambition to empower citizens and consumers alike to interact, pay, connect, travel and vote in ways that are now possible in a connected environment. IDEMIA – MORPHO is Payment Card Industry Data Security Standard (PCI DSS) certified company.

HID Global’s ActivID Authentication Appliance is used by enterprises and banks worldwide to secure access to networks, cloud applications and online services to prevent breaches and achieve compliance with the updated FFIEC guidance, PCI DSS and equivalent mandates, policies and guidelines.

Integrated Access Security is a commercial security systems company serving Redwood City. There Access control meet PCI regulation.

QNAP storage system have the following security certifications:
HIPAA Compliance
SSAE 18 Type II Certification
PCI-DSS Compliant

FIPS 140-2 Level 3 Validated Data Handling Practices

Ref:
https://www.rhombussystems.com/blog/security/what-type-of-video-security-system-do-you-need-to-be-pci-compliant/
https://www.pcisecuritystandards.org/document_library?category=educational_resources&subcategory=educational_resources_general
https://www.securitymetrics.com/blog/what-are-12-requirements-pci-dss-compliance
https://www.pcisecuritystandards.org/get_involved/participating_organizations